Changes To Experiment: mmmv_symsig_t1
Not logged in

Changes to "Experiment: mmmv_symsig_t1" between 2017-10-10 01:46:15 and 2017-10-10 02:00:15

    69     69   </div>
    70     70   
    71     71   <div><br>
    72     72   </div>
    73     73   
    74     74   <div><br>
    75     75   </div>
           76  +
           77  +<h1>Worldwide Scaling</h1>
           78  +
           79  +<div>If KXSs of one town, for example, Tallinn, register themselves as users at
           80  +KXSs of another town, for example, Berlin, then the users of Tallinn KXSs can
           81  +have a probabilistically secure onionencrypted session with the Berlin KXSs and
           82  +register themselves as "2. class users" of the Berlin KXSs. "1. class users" of
           83  +a KXS are those, who exchange the keys with a KXS directly. If New York KXSs
           84  +have been registered as 1. class users at the Berlin KXSs, then the 1. class
           85  +users of Tallinn KXSs can register themselves as 3. class users of New York
           86  +KXSs. If 7. class users of Tallinn KXSs were using the same route for
           87  +registering themselves at the New York KXSs, then they would become 8. class
           88  +users of the New York KXSs. If London KXSs are 4. class users at the KXSs, then
           89  +the 1. class Tallinn KXSs can register themselves as 4.+1.=5. class users at
           90  +the London KXSs.&nbsp;<br>
           91  +</div>
           92  +
           93  +<div><br>
           94  +</div>
           95  +
           96  +<div><br>
           97  +</div>
    76     98   
    77     99   <h1>Beneficial side Effects&nbsp;</h1>
    78    100   
    79    101   <div>The more KXSs there are, the more break-ins have to be conducted to get
    80    102   all the keys that the Alice and the Bob use for communicating with the KXSs. If
    81    103   all of the sessions between the KXSs and their users are decrypted by
    82    104   eavesdroppers other than the KXSs themselves, then an increase of the number of
................................................................................
   128    150   
   129    151   <div><br>
   130    152   </div>
   131    153   
   132    154   <h1>Who Might want to use such a System</h1>
   133    155   
   134    156   <div><b>Only freelancers and privacy advocates that have the monetary means to
   135         -physically meet the KXSs.</b>&nbsp;The need to physically meet the KXSs forbids
   136         -worldwide adoption by free software developers, because travelling costs and
   137         -not everybody is able to travel everywhere even, when money is not an issue<i>(read:
   138         -the Edward Snowden case, visas, etc.)</i>.</div>
          157  +physically meet with the KXSs.</b>&nbsp;The need to physically meet with the
          158  +KXSs forbids worldwide adoption by free software developers, because travelling
          159  +costs and not everybody is able to travel everywhere even, when money is not an
          160  +issue<i>(read: the Edward Snowden case, visas, etc.)</i>.</div>
   139    161   
   140    162   <div><b><br>
   141    163   </b></div>
   142    164   
   143    165   <div>Megacorporations &nbsp;want to spy on their salary slaves, generally known
   144    166   as "employees", and this system, if properly implemented and used, prevents the
   145    167   spying. Banks that use checks in stead of pin calculators in 2017 certainly