Re: how email encryption should work

2005-04-11 Thread Bill Stewart
(Sorry if this is a duplicate and I'm only greylisted or something. Stupid hotel proxy servers) At 07:00 PM 3/28/2005, James A. Donald wrote: In my blog http://blog.jim.com/ I post how email encryption should work I see a couple of problems with your proposal. I'm not sure I like your external

Re: how email encryption should work

2005-04-11 Thread Bill Stewart
At 07:00 PM 3/28/2005, James A. Donald wrote: In my blog http://blog.jim.com/ I post how email encryption should work I see a couple of problems with your proposal. I'm not sure I like your external trusted mail-server assumptions, but they're probably good enough for many people, and other people

Re: how email encryption should work

2005-04-11 Thread James A. Donald
-- James A. Donald: In my blog http://blog.jim.com/ I post how email encryption should work On 8 Apr 2005 at 22:17, Bill Stewart wrote: I see a couple of problems with your proposal. I'm not sure I like your external trusted mail-server assumptions Trusting the mail server

Re: How email encryption should work

2005-03-29 Thread Lars Eilebrecht
According to James: I would appreciate some analysis of this proposal, which I think summarizes a great deal of discussion that I have read. Here is how email encryption should work: [...] * In the default case, the mail client, if there are no keys present, logs

Re: How email encryption should work

2005-03-29 Thread James A. Donald
-- On 29 Mar 2005 at 11:54, Lars Eilebrecht wrote: Are you saying that the keyserver creates the public-private key pair for the user? That doesn't sound like a good idea. Not what I said, though that is one possible way of implementing the proposal. Another possible way is that the

Re: How email encryption should work

2005-03-29 Thread Lars Eilebrecht
According to James: I would appreciate some analysis of this proposal, which I think summarizes a great deal of discussion that I have read. Here is how email encryption should work: [...] * In the default case, the mail client, if there are no keys present, logs

How email encryption should work

2005-03-29 Thread James A. Donald
-- In my blog http://blog.jim.com/ I post how email encryption should work I would appreciate some analysis of this proposal, which I think summarizes a great deal of discussion that I have read. Here is how email encryption should work: * The user should automagically get his key

How email encryption should work

2005-03-28 Thread James A. Donald
-- In my blog http://blog.jim.com/ I post how email encryption should work I would appreciate some analysis of this proposal, which I think summarizes a great deal of discussion that I have read. Here is how email encryption should work: * The user should automagically get his key