In summary, Jon Callas wrote, about the challenges of ascertaining identities:

The who who make you an authority are the community, and they do it because you act like one.


This is just one of three models of identity assessment, prior to any technological component:

one's reputation in a community,

one's track record of past interactions with the relying party (e.g. account payment history), and

one's participation in a formal ceremony (e.g. applying for a passport).

The PGP vs PKI analysis puts emphasis on the first one, mainly because the PKI proponents has not been very explicit about identity assertion model. But the other two models are operating here and there in the IT security landscape.



--
- Thierry Moreau

CONNOTECH Experts-conseils inc.
9130 Place de Montgolfier
Montreal, QC, Canada H2M 2A1

Tel. +1-514-385-5691
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to