Editing 364: Responsible Behavior
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 2: | Line 2: | ||
| number = 364 | | number = 364 | ||
| date = December 31, 2007 | | date = December 31, 2007 | ||
− | | title = Responsible | + | | title = Responsible Behaviour |
| image = responsible_behavior.png | | image = responsible_behavior.png | ||
| titletext = Never bring tequila to a key-signing party. | | titletext = Never bring tequila to a key-signing party. | ||
Line 8: | Line 8: | ||
==Explanation== | ==Explanation== | ||
− | + | {{incomplete|Wrong: I can't count all the errors here}} | |
+ | In order to receive encrypted mail from people, you need to have a public key. This will let people encrypt emails to you that only you can read. However, there is the problem of authentication, how do you know for certain that key X belongs to person Y, someone could just have made a fake key so they can decrypt and read your mail and then pass it on to the real recipient (reencrypting it, so he doesn't know that you've read it). This is called a man-in-the-middle attack. | ||
− | + | One solution for this is that people sign each other's keys. It works like this: say you want to send an email to Bob, but you've never met him. You find his key online (they are stored on certain servers, like cryptographic phone books), but how can you be sure that it's really his? Well, turns out that you have a friend Alice, and you have her key and you know that it is hers. If Alice has signed Bob's key with her key (which only she can do, you need the secret part of the key-pair), it means that she's dead certain that that really is Bob's key (maybe they are friends, or have met somewhere in real life). So then you can be sure that Bob's key is genuine (since you have a common friend, Alice) and that your communications will be safe. | |
− | + | A key-signing party is simply a super-geeky party where people meet in real life so that they can be sure of people's identity and then everyone signs everyone else's key. It's a good way to expand the web of trust. The joke here is that he has no idea who this girl is and yet he signed her key. The humor lies in the juxtaposition of what you expect (that they had sex) and what is the case (they signed each other's key, also known as geek-sex). | |
− | |||
− | A | ||
− | |||
− | The humor lies in the juxtaposition of what you expect (that they had sex) and what is the case (they signed each other's | ||
− | |||
− | |||
==Transcript== | ==Transcript== | ||
− | :[Cueball on | + | :[Cueball on phone.] |
:Voice: Hey, I just got home from the party | :Voice: Hey, I just got home from the party | ||
:Cueball: The one with the IRC folks? | :Cueball: The one with the IRC folks? | ||
Line 35: | Line 30: | ||
{{comic discussion}} | {{comic discussion}} | ||
− | |||
− | |||
[[Category:Comics featuring Cueball]] | [[Category:Comics featuring Cueball]] | ||
− | [[Category: | + | [[Category:Computers]] |
− |