Two GCC stories
Two GCC stories
Posted Jul 1, 2010 0:21 UTC (Thu) by tialaramex (subscriber, #21167)In reply to: Two GCC stories by fsateler
Parent article: Two GCC stories
Barry Trotter - You believe the key owner is named Barry Trotter, e.g. you have seen government photo ID proving that this is their name, or you know them well personally and they have always gone by this name.
<barr@example.com> - You believe the key owner is contactable by the barr@example.com email address
http://barry.example.com/ - You believe the key owner has control over the barry.example.com machine or the web site found there
[a photo] - You believe this is a reasonably current image of the key owner.
NB signing an identity is distinct from trusting the key owner to authenticate other people in the web of trust. BUT it makes no sense to give this trust to an unsigned key. How can you trust "their" opinions if you don't know anything at all about them? That makes no sense. "They" may be a facsimile providing a composite of opinions from other people you trust... until you grant them enough trust to be exploited, and then it's game over.
