Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

8
  • Sounds like a scenario for public key crypto. Let them give you their public key. Commented Dec 23, 2013 at 8:53
  • 1
    @deceze and how would you verify that it is their public key? Commented Dec 23, 2013 at 8:59
  • @AviD If all you have is a digital end point with no out-of-band method of verifying the identity, how do you know you're talking to the person you think you are to begin with? Commented Dec 23, 2013 at 9:08
  • @deceze exactly. Therein lies the OP's problem. Commented Dec 23, 2013 at 9:11
  • @AviD So, assuming we somehow got over that initial hurdle to begin with (which is, as you say, probably the real problem), a public key exchange is probably the most practical... :) Commented Dec 23, 2013 at 9:13