Precisely. You have no way of knowing anything about the alleged identity 
behind a key without having some form of interaction through a secure channel 
(like real-world interaction). 

On Jun 7, 2013, at 3:53 PM, Florian Weimer <[email protected]> wrote:

> Practically speaking, this is true.  Maybe I'm a bit naïve, but I
> expect it's difficult to model such global semantic concerns
> accurately, including the fact that you cannot actually use public
> keys as identities because in reality, no one wants to talk to a key.


Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to