Does Public Key Infrastructure also work in the dark net such as Tor/Freenet?

If there is a root CA, how can decentralization be real?

@Acer because you still the one who generate the CA and sent it to some ca issuer that could vouch for your ca.

@deesapoetra

generate the ca or generate the cert?
Central Authority should not be the person await trust
Certificate should be generate by the central Authority not the user.

> Issuer can vouch your...
Isn't issuer the pki?

@Acer ah yes i must mixing thing up a bit.
I always refer certificate as "CA".
Central Authority is just them vouching for your key

@deesapoetra

Look at my original question.
I knew they might be able to vouch people's public key.
My question is how.

@Acer well. I can put my public key fp and then upload my photos later with me mentioning it on a paper.
That's one way.

@deesapoetra

What is fp

The keypoint here seems to be the paper.
Why not just mention public key in the paper

@Acer well. Because fingerprint are unique. You can't generate a key with same fingerprints twice and that i think is enough for a method of proof.

@deesapoetra

But that's need to vouch for fingerprint first instead of public key

If you can do fingerprint vouch first, basically you needn't pki

@Acer
You still need it if your key meant to be used as your main way to connect with people.
Are you satisfied with only one people trusting you ? Are people gonna think the same as you ?
And that's why PKI makes everything easier.

@deesapoetra

you can just use your key with your fingerprint
You public key can be public without pki

Pki makes things easier possibly not due to fingerprint

@Acer
> you can...
...without pki.

Yes you can always do that. but wouldn't it also serve the same purpose as using PKI too? I mean both way you upload you key fp or public key content anyway.

> PKI makes things easier...
... Fingerprint.

Yes. It make things such as vouching became so much easier.

@deesapoetra

Upload fp might not be the standard way.
Pki can t vauch fp more easily than to vauch key

@Acer well. Since you upload your key to a key server, your need to share your key to someone is not an issue. They can always pull it from the server.

And instead of uploading your public key to your social media as a method of proof that you own the key after putting it on keyserver.
You can just wrote your fingerprints and took photos with you holding it.
It's just convinient. Since you can't generate a key with the same fingerprints twice (if it did met current standard).

@Acer ofc! The key point is trust (if you only exchange your key to one person only) and WOT.

@deesapoetra

key concept is trust.
But I need more on protocol rather than concept

@Acer you can't have a fixed protocol for an asymetrical encryption, it always change as computing power became buffed overtime, at least that's what current limitation for asymetrical encryption. (Well maybe because it's asymetrical in the first place?)

Follow

@deesapoetra

I like pizza. Simple (for people do dishes)

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.