Two things:<div><br></div><div>1. This would be extremely useful for most people's communications; they want privacy, not anonymity to deniability. (This sort of strong proof-of-identity linked with a key is perfect for, e.g., doctors, lawyers, and other professionals.)</div>
<div><br></div><div>(I agree with Trevor that Greenwald/Snowden is inapt.)</div><div><br></div>But. Suppose that Android app is malicious. For the static case, it can, I assume, impersonate you forever. How does the private secret in passports thing work?<div>
<div><br></div><div>2. Pond's low-bandwidth is an artificial constraint. It is easy enough to run Pond sans Tor, with arbitrarily high message rate. (I've played around with this a little, actually.)</div><div><br>
</div><div><div>Introductions are easy, while still avoiding spam: Just require a really expensive non-parallelizable proof-of-work/puzzle (e.g., 4 core-hours). (The Bill Gates proposal.) Scrypt can't do this without vast amounts of memory, but some of the PHC entrants can. </div>
<div><br></div><div>- David</div><div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div>
</div></div>
</blockquote></div></div></div>