Precisely. You have no way of knowing anything about the alleged identity behind a key without having some form of interaction through a secure channel (like real-world interaction).
On Jun 7, 2013, at 3:53 PM, Florian Weimer <[email protected]> wrote: > Practically speaking, this is true. Maybe I'm a bit naïve, but I > expect it's difficult to model such global semantic concerns > accurately, including the fact that you cannot actually use public > keys as identities because in reality, no one wants to talk to a key.
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
