Thoughts on droplets

Ben Laurie ben@algroup.co.uk
Tue, 02 Nov 1999 21:59:37 +0000


shapj@us.ibm.com wrote:
> 
> > So this hypothetical hardware contains only publicly
> > available algorithms and no secret keys?
> 
> I didn't say that.  The hardware contains publicly available algorithms and
> a private key (as distinct from a secret key).  No shared secrets are
> involved.  The control issue that concerns you about shared secrets
> therefore does not arise.

That was the obvious answer. But how do you protect the private key from
abuse?

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

"My grandfather once told me that there are two kinds of people: those
who work and those who take the credit. He told me to try to be in the
first group; there was less competition there."
     - Indira Gandhi