-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
On 14. August 2014 05:31:40 MESZ, Phil Pennock <sks-devel-p...@spodhuis.org> wrote: > >What is the threat model which you are trying to protect against? As the public keys themselves are of cause nothing which needs to be secured, I see these two possible aspects: - - meta data like 'who up-/downloaded which keys' could be revealed - - mitm attacks may manipulate up-/downloaded keys Or am I thinking in the wrong direction? -----BEGIN PGP SIGNATURE----- Version: APG v1.1.1 iHEEAREIABoFAlPsndgTHE1hdHRoaWFzIFNjaHJlaWJlcgAKCRCTx5mTdvm6YJoP APdcwvUoviWwrXwQXnFl4xgcJdsMxpmrwi3OhYjMbMxDAP92ncpZ6L690fsP56mI y6/1D3UJxrVuQvoS6BLZylceSA== =O+Ja -----END PGP SIGNATURE----- _______________________________________________ Sks-devel mailing list Sks-devel@nongnu.org https://lists.nongnu.org/mailman/listinfo/sks-devel