[148272] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Explaining PK to grandma

daemon@ATHENA.MIT.EDU (Nico Williams)
Tue Nov 26 12:49:29 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 26 Nov 2013 11:12:35 -0600
From: Nico Williams <nico@cryptonector.com>
To: Ralf Senderek <crypto@senderek.ie>
In-Reply-To: <alpine.LFD.2.02.1311261526270.3929@laptop.kerry-linux.ie>
Cc: Cryptography <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Tue, Nov 26, 2013 at 03:37:42PM +0100, Ralf Senderek wrote:
> On Tue, 26 Nov 2013, Nico Williams wrote:
> >Now in the virtual world you can duplicate anything. So you can have as =
many
> >key-duplicates and box-duplicates as you would like. (implicit explainat=
ion of
> >copying isn't a bad thing.)

Please be careful with attributions.  The above was written by "Lodewijk
andr=E9 de la porte" <l@odewijk.nl>, not me.

Nico
-- =

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post