[liberationtech] 15 years later, why can't Johnny still not encrypt?
Nicolai Hähnle-Montoro
nhaehnle at gmail.com
Wed Jan 15 13:52:55 PST 2014
On Wed, Jan 15, 2014 at 8:32 PM, Joseph Lorenzo Hall <joe at cdt.org> wrote:
> I'm thinking of operations like fingerprint verification. I can
> analogize encryption to locking boxes with keys (even asymmetric or
> DHE), but when it comes to other kinds of things (even explaining the
> utility of a cryptographic hash), there aren't a lot of real-world
> analogies to bootstrap their intuition. Maybe this will come in future
> generations of socialized human.
It seems to me that a usable mail encryption and authentication system
should work without ever showing a user any kind of hash except for
key fingerprints, so you don't _need_ an analogy.
For the fingerprints, perhaps it would be best to just pretend that
the fingerprint is the _identity_ of the person.
cu,
Nicolai
--
Lerne, wie die Welt wirklich ist,
aber vergiss niemals, wie sie sein sollte.
More information about the liberationtech
mailing list