Changes To Experiment: Chainsignature
Not logged in

Changes to "Experiment: Chainsignature" between 2017-08-02 11:15:44 and 2017-08-02 11:16:52

    35     35   that an eavesdropper can not reuse the signature for signing its own message.
    36     36   To make eavesdropping and hijacking more difficult, different messages might be
    37     37   sent through different channels.&nbsp;</p>
    38     38   
    39     39   <p><br>
    40     40   </p>
    41     41   
    42         -<h1>Optional Bootstrapping</h1>
           42  +<h1>Anti-hijack Measures</h1>
    43     43   
    44     44   <p>The message M_1 might be accompanied by M_0, which might be some bitstream
    45     45   that is distributed as a small piece of paper with a QR-code. Given that NSA
    46     46   and alike do not intercept paper-mail/snail-mail without specifically targeting
    47     47   someone, because the cost of doing physical processing of physical letters is
    48     48   too high, some initial symmetric cryptography keys and the M_0 might be sent by
    49     49   using snail-mail. Snail-mail has various different channels and part of the