Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Eccentric Authentication again

Guido Witmond guido at witmond.nl
Fri Sep 6 04:04:15 PDT 2013


Hello all,


I've written two new blog entries on eccentric authentication. The
protocol that uses client certificates and a local CA to distribute
public keys between strangers in a secure way.

I hunbly believe it is the most user friendly way to do cryptography
correctly. End users don't see the crypto at all.


Please read in this order:

http://eccentric-authentication.org/blog/2013/08/31/the-holy-grail-of-cryptography.html

http://eccentric-authentication.org/blog/2013/09/05/a-subversive-idea.html



I'd love to hear comments, remarks, improvements. Feel free to play with
the demo.

Regards, Guido.

PS, it needs Tor or others to protect against traffic analysis.



More information about the liberationtech mailing list