Even if you assume the PIN is uniformly random (you should not assume this), it is only log2((10+26)^6) ~ 31 bits of entropy. This does not satisfy standard notions of secure channel establishment.
Magic Wormhole (https://github.com/magic-wormhole/magic-wormhole) avoids this by using a password authenticated key exchange (PAKE) protocol. If you don’t use a PAKE, you get trivial brute force attacks from anyone with a transcript.
"Given the presence of bird flu on the premises, all 1.8 million birds need to be culled, aka "depopulated." "
Can you picture 1.8 million birds? Now picture them all being gassed. Now, I'm not vegan but that's grim.
"Workers are tasked with placing the birds in the chambers, which only hold a few dozen birds at a time. In all, the method requires workers to have a high degree of contact with the infected birds, going from bird to bird and batch to batch with the carts."
What a great idea.
https://www.nationalchickencouncil.org/statistic/broiler-ind...
Afaict identity based cryptography requires a trusted third party. If you already have a trusted third party, might as well skip all this complexity and just communicate through them.
After all communicating through twitter DMs is pretty secure & convinent, if you take it as a given that twitter is trutworthy.