Kyle Hasselbacher wrote:
This discussion reminds me of an interest I took in zero-UI crypto a while back. I put my interest in some words here:
http://www.toehold.com/~kyle/k5/easy-hard-crypto.html
http://www.toehold.com/~kyle/k5/robotca.html
It's never totally transparent. Alice has a working zero-UI crypto system. Alice's computer is lost, stolen, broken. She gets a new one, sets it up for email, but all her friends are still encrypting to a key she no longer has. How does she inform them? How does she prove that she's not Eve trying to take over Alice's account? Can you do it without human intervention?
Will we require that users taken an intelligence test before every email they send? Decode the twisted and cruel text! Answer me these questions three! JUMP, user, JUMP! Prove you're not a suture-headed mutant!