Search Mailing List Archives
[liberationtech] Eccentric Authentication again
guido at witmond.nl
Fri Sep 6 04:04:15 PDT 2013
I've written two new blog entries on eccentric authentication. The
protocol that uses client certificates and a local CA to distribute
public keys between strangers in a secure way.
I hunbly believe it is the most user friendly way to do cryptography
correctly. End users don't see the crypto at all.
Please read in this order:
I'd love to hear comments, remarks, improvements. Feel free to play with
PS, it needs Tor or others to protect against traffic analysis.
More information about the liberationtech