Guido Witmond
2013-09-05 14:50:32 UTC
Hello all,
I've written two new blog entries on eccentric authentication. The
protocol that uses client certificates and a local CA to distribute
public keys between strangers in a secure way.
Please read in this order:
http://eccentric-authentication.org/blog/2013/08/31/the-holy-grail-of-cryptography.html
http://eccentric-authentication.org/blog/2013/09/05/a-subversive-idea.html
I'd love to hear comments, remarks, improvements.
Regards, Guido.
I've written two new blog entries on eccentric authentication. The
protocol that uses client certificates and a local CA to distribute
public keys between strangers in a secure way.
Please read in this order:
http://eccentric-authentication.org/blog/2013/08/31/the-holy-grail-of-cryptography.html
http://eccentric-authentication.org/blog/2013/09/05/a-subversive-idea.html
I'd love to hear comments, remarks, improvements.
Regards, Guido.