(Sorry if this is a duplicate and I'm only greylisted or something.
Stupid hotel proxy servers)
At 07:00 PM 3/28/2005, James A. Donald wrote:
In my blog http://blog.jim.com/ I post how email encryption should work
I see a couple of problems with your proposal.
I'm not sure I like your external
At 07:00 PM 3/28/2005, James A. Donald wrote:
In my blog http://blog.jim.com/ I post how email encryption should work
I see a couple of problems with your proposal.
I'm not sure I like your external trusted mail-server assumptions,
but they're probably good enough for many people,
and other people
--
James A. Donald:
In my blog http://blog.jim.com/ I post how email
encryption should work
On 8 Apr 2005 at 22:17, Bill Stewart wrote:
I see a couple of problems with your proposal. I'm not
sure I like your external trusted mail-server
assumptions
Trusting the mail server
According to James:
I would appreciate some analysis of this proposal, which
I think summarizes a great deal of discussion that I
have read.
Here is how email encryption should work:
[...]
* In the default case, the mail client, if there are
no keys present, logs
--
On 29 Mar 2005 at 11:54, Lars Eilebrecht wrote:
Are you saying that the keyserver creates the
public-private key pair for the user? That doesn't
sound like a good idea.
Not what I said, though that is one possible way of
implementing the proposal.
Another possible way is that the
According to James:
I would appreciate some analysis of this proposal, which
I think summarizes a great deal of discussion that I
have read.
Here is how email encryption should work:
[...]
* In the default case, the mail client, if there are
no keys present, logs
--
In my blog http://blog.jim.com/ I post how email
encryption should work
I would appreciate some analysis of this proposal, which
I think summarizes a great deal of discussion that I
have read.
Here is how email encryption should work:
* The user should automagically get his key
--
In my blog http://blog.jim.com/ I post how email
encryption should work
I would appreciate some analysis of this proposal, which
I think summarizes a great deal of discussion that I
have read.
Here is how email encryption should work:
* The user should automagically get his key