Am 15.01.2015 um 15:02 schrieb carlo von lynX:
> ever beat the power of adopting a person from the social graph. When
> Amy, Eleanor, Billy and Jake claim that Bob is a friend of theirs,
> and they all provide the same public key for Bob, why should Alice
> worry that Bob may actually be a fake that fooled all their common
> friends?
> 
> So once a distributed graph is available as an instrument to the
> majority of human beings, I expect that public keys will proliferate
> freely and construct a solid basis for an end-to-end encrypted
> infrastructure for humanity. The question to me is only who will
> be the first to provide such a tool. I am not aware of anyone else
> working on the same challenge.

C'mmon Carlo - a distributed graph, holding the state of some
application process, build from signed messages, available at&from peers
only, requiring enough signature from a given set to resist byzantine
malicious parties - that's what you're calling here for. Or did I
missunderstand your post?

/Jörg



-- [email protected]
   https://lists.secushare.org/mailman/listinfo.cgi/secu-share

Reply via email to