[Cryptography] Verification of Identity

Paul F Fraser paulf at a2zliving.com
Sat Feb 18 15:16:00 EST 2017


On 18/02/2017 8:32 AM, John Levine wrote:
> In article <afb560c3-8dee-5a20-284c-668859957168 at a2zliving.com> you write:
>> I intend to verify users by having them provide a list of 5 email addresses that the system will
>> email with basic details and an image and expect a reply with a a Yes/No type response.
> I have several thousand e-mail addresses (not all in the same domains)
> so I look forward to having several thousand verified identities.
>
> R's,
> John
>
Hi John,

OK, the emails are a bad idea.

The discussion so far and some comments in some private emails suggest, quite correctly, that for 
all intents and purposes, it is impossible to prove your REAL identity.

What I think is possible is that you can prove the person you are communicating with looks like the 
image you have linked to a certificate, (in effect the public key).

The main purpose for "ProveId" is to have users in a walled network (all with certificate) aware 
that the person they are communicating with looks like the linked image.

The verification trust can be built by keeping a count on the number of times the image is accepted 
by other network members when the image is presented both online and face to face.

Paul



More information about the cryptography mailing list