Thoughts on droplets

Ben Laurie
Tue, 02 Nov 1999 21:59:37 +0000 wrote:
> > So this hypothetical hardware contains only publicly
> > available algorithms and no secret keys?
> I didn't say that.  The hardware contains publicly available algorithms and
> a private key (as distinct from a secret key).  No shared secrets are
> involved.  The control issue that concerns you about shared secrets
> therefore does not arise.

That was the obvious answer. But how do you protect the private key from




"My grandfather once told me that there are two kinds of people: those
who work and those who take the credit. He told me to try to be in the
first group; there was less competition there."
     - Indira Gandhi