Ed Greshko wrote: > > It would be very nice if someone would fully define what they mean by > the very vague term "fake key". > And along with that, define the method used to distribute said key in a manner that would be oblivious to the all end users. It has to be oblivious to all end users such that nobody would be able to raise an alarm in a reasonable amount of time. If the public/private key methods employed today are as easy to penetrate and subvert as some seem to be claiming then one has to question why it hasn't already been done. -- Gravity brings me down. -- fedora-list mailing list fedora-list@xxxxxxxxxx To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines