g_pepper comments on Self-verification - Less Wrong Discussion
You are viewing a comment permalink. View the original post to see all comments and the full post content.
You are viewing a comment permalink. View the original post to see all comments and the full post content.
Comments (43)
This question is partially explored in Memento.
I edited the post because I forgot to include a key constraint to the problem, which is that an attacker can/will be trying to send you false information from "yourself" so you need a way to distinguish. In this case it's relevant because an attacker could cover you with tattoos before your memories were wiped.
Yep, I actually realized that was a problem even before your edit, because you asked about signing and verification; this is why I said "partially explored". Still, Memento is IMO a good exploration of someone trying to deal with the issue even if his solution is not fool-proof.