Hacker News new | past | comments | ask | show | jobs | submit login

Right, forgot about those. Still those are just two more commands, which brings us to 5. That shouldn't push the complexity up significantly and doesn't change anything about my argument.



What about getting someone's key?

What about distributing your key?

What about backing up your secret keys on paper?

What about binding your primary secure key that is usually stored in a safe on a Yubikey with secondary keys stored on Yubikeys you carry around with you?

What about revoking a secondary key after a laptop or Yubikey got stolen?

Perhaps you see where I'm going with this :)

The problem domain is just complex.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: