pocallaghan at gmail.com
Sun Jun 1 15:05:49 UTC 2008
On Sun, 2008-06-01 at 17:12 +0930, Tim wrote:
> > Simply put, one could create a keylist, publish it someplace secure
> > with limited access and limited time availability, communicate to
> > designated individual where and when, and the designated individual
> > could use something like VPN to pick up the encrypted key list. The
> > key to break that key list could be given over the phone. The
> > would certainly minimize exposure of the keys.
> I'm not sure that exposure of keys is a problem (so long as keys are
> strong). I'd be unconcerned about exposure of uncrackable keys if
> and key IDs were used, with no way to harvest email addresses from
> i.e. If keys didn't contain addresses, just unique IDs.
The whole crux of the problem isn't exposing the (public) keys, it's
reliably associating a public key with an identity.
More information about the users