Boston Linux & UNIX was originally founded in 1994 as part of The Boston Computer Society. We meet on the third Wednesday of each month, online, via Jitsi Meet.

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] root CA bloat



On 11/25/2014 1:15 PM, Derek Martin wrote:
> Let's say I meet you on the street, and you tell me you are Steven
> Smith, and produce very good fake ID to that effect.  As it happens
> (in this scenario) I am exceptionally good at spotting fake ID.  I
> prove that your ID is fake.  This does not prove to me who you are--it
> only proves to me one identity whom you are not.

It proves that I'm that particular guy you met on the street. You may 
not know my real identity but you still have a piece of information -- a 
fingerprint if you will -- that is uniquely mine. If that fingerprint is 
used then you know that it's the guy you met on the street with Steven 
Smith fake ID #32. That's all you need if you want to communicate with 
fake Steven Smith #32.

At which point a web of trust or hybrid web and chain can be used if you 
need more than that. It's not an unsolvable problem. It's already been 
solved: social networks. What is your friends list on Facebook? It's a 
web of trust. What is a "like" on Facebook? It's someone in your web of 
trust endorsing some bit of information that you will see in your news 
feed given enough endorsements.

-- 
Rich P.



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org