Hacker News new | past | comments | ask | show | jobs | submit login

Consider a benevolent cryptographer, who is able to break modern asymmetric cryptography, but refuses to use it for petty personal gain, and is fully aware of the dangers of publishing it (why this cryptographer put it in dead man's switches instead, with recipients randomized over nearly all power blocs, political groups, companies, ...)

The cryptographer never implemented it on daily compute devices.

Perhaps this cryptographer would be willing to risk a low communication round release of private keys corresponding to public keys in ROM or burnt in eFuses etc... but only if the public key dump is sufficiently large and encompassing.

From the perspective of the cryptographer we are all whining wankers, and we should just collect all the public keys as a wishlist.

The cryptographer care naught about "liberating" hour long advertisements for the militaries or intelligence agencies etc. The cryptographer does wish sovereign compute to fellow humans, a primordial requisite for effective democracy.

====

While I understand the average programmer would ascribe an incredibly low probability to the above, the absolute absence of such a comprehensive public key dump is not in proportion to the probability considered.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: