Comment Re:I do not understand (Score 1) 87
I send an anonymous post to a 2nd secure communicator who receives messages for display. The message includes what I am interested in communicating about along with the encryption key, ,e used to encrypt messages to me, the open data store that I am going to be looking in for messages.
A 3rd secure communicator who can view messages collated and presented by the 2nd secure communicator who is interested in communicating on the same subject uses the encryption key to create a message for me to read. The 3rd secure communicator crafts a message including their own encryption key and the open data store they will be using, encrypts it ans sends it to the open data store I will be using.
The messages can include things like digital signatures to verify the source.
The only things need to two way communication to take place is for both parties to be able to read messages intended for them and to be able to send messages that can be read by their intended recipient. Everything else that we commonly include today is to make sure that the communication succeeds in an environment where everything can break all the time. Network technology has come a long way since those ancient times of token ring and arpanet.
You do not need to know who you are talking to to have a secure and private communication.
A 3rd secure communicator who can view messages collated and presented by the 2nd secure communicator who is interested in communicating on the same subject uses the encryption key to create a message for me to read. The 3rd secure communicator crafts a message including their own encryption key and the open data store they will be using, encrypts it ans sends it to the open data store I will be using.
The messages can include things like digital signatures to verify the source.
The only things need to two way communication to take place is for both parties to be able to read messages intended for them and to be able to send messages that can be read by their intended recipient. Everything else that we commonly include today is to make sure that the communication succeeds in an environment where everything can break all the time. Network technology has come a long way since those ancient times of token ring and arpanet.
You do not need to know who you are talking to to have a secure and private communication.