[liberationtech] 15 years later, why can't Johnny still not encrypt?

Nicolai Hähnle-Montoro nhaehnle at gmail.com
Wed Jan 15 13:52:55 PST 2014


On Wed, Jan 15, 2014 at 8:32 PM, Joseph Lorenzo Hall <joe at cdt.org> wrote:
> I'm thinking of operations like fingerprint verification. I can
> analogize encryption to locking boxes with keys (even asymmetric or
> DHE), but when it comes to other kinds of things (even explaining the
> utility of a cryptographic hash), there aren't a lot of real-world
> analogies to bootstrap their intuition. Maybe this will come in future
> generations of socialized human.

It seems to me that a usable mail encryption and authentication system
should work without ever showing a user any kind of hash except for
key fingerprints, so you don't _need_ an analogy.

For the fingerprints, perhaps it would be best to just pretend that
the fingerprint is the _identity_ of the person.

cu,
Nicolai
-- 
Lerne, wie die Welt wirklich ist,
aber vergiss niemals, wie sie sein sollte.



More information about the liberationtech mailing list