> It struck me that a GnuPG key, produced as proof of work, would be > more generally useful than an arbitrary hash. But now I see that > challenge-based proof of work could just be used to authenticate a > GnuPG key for signing and message encryption.
How? What is there about the proof of work that can somehow authenticate a GnuPG certificate? _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users