<p dir="ltr">This problem has been solved a million times already. The mobile phone network is relatively secure*, HTTPS hasn't exploded yet** and SSH seems fairly reliable***. PKI isn't a new thing. </p>
<div class="gmail_quote">On 11 Jun 2015 6:52 pm, "Paul Wilkins" <<a href="mailto:paulwilkins369@gmail.com">paulwilkins369@gmail.com</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">On 11 June 2015 at 18:01, Damian Guppy <span dir="ltr"><<a href="mailto:the.damo@gmail.com" target="_blank">the.damo@gmail.com</a>></span> wrote:<br><div class="gmail_extra"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="color:#000;background-color:#fff;font-family:Helvetica Neue-Light,Helvetica Neue Light,Helvetica Neue,Helvetica,Arial,Lucida Grande,Sans-Serif;font-size:16px">I would have thought each NTU has its own encryption key, and not a single key nationwide that could be easily compromised. <br><div style="font-family:Helvetica Neue-Light,Helvetica Neue Light,Helvetica Neue,Helvetica,Arial,Lucida Grande,Sans-Serif;font-size:16px"><div style="font-family:HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida Grande,Sans-Serif;font-size:16px"><div dir="ltr">(and even then, those keys should only really be session keys that roll-over periodically).</div></div></div></div></blockquote><div><br></div><div>Now as an exercise for the reader, deploy Private Keys to each NTU at scale.<br><br></div><div>Paul Wilkins <br></div></div></div></div>
<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" rel="noreferrer" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div>