In article <[log in to unmask]>, Ahmad Risk
<[log in to unmask]> writes
>Not as simple as that, Alan :-)
>
>One will need to establish a 'doamin of trust'. That means, for
>example, you and I exchange keys, you and I somehow establish to each
>other who we are, you and I 'authenticate' each other's identity and
>key.
Of course Ahmad nothing is that simple - Alan and I have no problem with
the concept of webs of trust. (AH may well have spoken for himself by
now!!). As you know, there are a number of "out of band" ways of
authenticating keys such as using fingerprints over phone or using a
trusted publication
--
John Williams
Email: [log in to unmask]
Fax: 01483 440928
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|