-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


On 14. August 2014 05:31:40 MESZ, Phil Pennock <sks-devel-p...@spodhuis.org> 
wrote:
>
>What is the threat model which you are trying to protect against?

As the public keys themselves are of cause nothing which needs to be secured, I 
see these two possible aspects:

- - meta data like 'who up-/downloaded which keys' could be revealed
- - mitm attacks  may manipulate up-/downloaded keys

Or am I thinking in the wrong direction?
-----BEGIN PGP SIGNATURE-----
Version: APG v1.1.1

iHEEAREIABoFAlPsndgTHE1hdHRoaWFzIFNjaHJlaWJlcgAKCRCTx5mTdvm6YJoP
APdcwvUoviWwrXwQXnFl4xgcJdsMxpmrwi3OhYjMbMxDAP92ncpZ6L690fsP56mI
y6/1D3UJxrVuQvoS6BLZylceSA==
=O+Ja
-----END PGP SIGNATURE-----


_______________________________________________
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel

Reply via email to