Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I see no particular reason why existing diplomatic courier services, chain of trust, and verification procedures can't be used for key exchange. What are the failure modes you are sceptical about?

>Will any of this work under wartime conditions when people are moving around, using random webcams and mobile devices?

Just follow the procedure to establish trust cryptographically, then arrange the meeting by any channel you like.



>Just follow the procedure to establish trust cryptographically,

ah, you figured it out!




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: