--
> > We discovered, however, that most people do not want
> > to manage their own secrets
StealthMonger wrote:
> This may help to explain the poor uptake of encrypted
> email.
There is very good uptake of skype and ssh, because
those impose no or very little additional cost on the
end
On 8 Dec 2008, at 22:43, David G. Koontz wrote:
JOHN GALT wrote:
StealthMonger wrote:
This may help to explain the poor uptake of encrypted email. It
would
be useful to know exactly what has been discovered. Can you provide
references?
The iconic Paper explaining this is "Why Johnny Ca
JOHN GALT wrote:
> StealthMonger wrote:
>
>> This may help to explain the poor uptake of encrypted email. It would
>> be useful to know exactly what has been discovered. Can you provide
>> references?
>
> The iconic Paper explaining this is "Why Johnny Can't Encrypt" available
> here: http://p
StealthMonger wrote:
> This may help to explain the poor uptake of encrypted email. It would
> be useful to know exactly what has been discovered. Can you provide
> references?
The iconic Paper explaining this is "Why Johnny Can't Encrypt" available
here: http://portal.acm.org/citation.cfm?id=
"James A. Donald" <[EMAIL PROTECTED]> writes:
> Of course, the old cypherpunk dream is a system with end to end
> encryption, with individuals having the choice of holding their own
> secrets, rather than these secrets being managed by some not very
> trusted authority
> We discovered, ho
A sim card contains a shared symmetric secret that is known to the
network operator and to rather too many people on the operator's staff,
and which could be easily discovered by the phone holder - but which is
very secure against everyone else.
This means that cell phones provide authenticati