Hacker News new | past | comments | ask | show | jobs | submit login

The affirmation part is the problem. Generating trustworthy signatures is a critical part of a cryptographic system.

Signing something requires access to the user's private key. If that key can be used by other entities to produce signatures, it is no longer private and can no longer be trusted.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: