On Monday 23 of January 2012 16:35:45 Holger wrote:
> 2012-01-23T03:09:55-05:00, Robert J. Hansen:
> > > Keyserver SPAM is a straw-man argument. Yes, it's possible for an
> > > address to be pulled from the key on a keyserver, in fact, I'm
> > > convinced harvesting probably takes place.
> >
> > As am I.  However, it should be pointed out that this is no reason to
> > avoid using the keyservers.
> >
> > One of the best ways to evaluate a defensive mechanism is whether it can
> > recover from a failure.  Consider securing your home.  A lock on the
> > front door is good, but once the thief is in past your front door the
> > lock is pointless.  It can't recover from a failure.
>
> I'm not a fan of comparisons at all, but I'd say my e-mail address feels
> more like my postal address, thus I tend to handle them similarly.
> But wouldn't you replace or enforce the lock on your front door once s.o.
> made it in? At least you would still keep locking it, wouldn't you?  ; )

And there's a very good reson why you shouldn't be a fan of such comparisions:
Unlike physical security, properly implemented cryptography is unbreakable at 
this time.

All key types in wide use are completely broken: tumbler locks, Gerdas, etc. 
they can be made useless with only a little bit of know-how and few simple 
tools.

The only known working attacks on cryptography use brute force: similar to 
going through the wall, when the doors with a lock are too big of an 
obstacle.

Regards,
-- 
Hubert Kario
QBS - Quality Business Software
02-656 Warszawa, ul. Ksawerów 30/85
tel. +48 (22) 646-61-51, 646-74-24
www.qbs.com.pl

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to