christophe barbé <[EMAIL PROTECTED]> writes:

> I forgot to mention that we exchanged encrypted secret words and that I
> check the fingerprint when I meet him.
> 
> He use his email address in his gpg key but his email address is not
> related to his name.
> 
> I am sure he is the guy behind the key.
> I started this thread because of the debian implication.
> 
> I believe that from the pure 'web of trust' point of view I can sign his
> key.
> 
> Now from the debian point of view, I don't know.  I understand that
> the NM process need an ID. So even if I sign his key or not, It
> should not be possible for him to go further without providing a gpg
> key containing his name and signed by a dd.  So this told me that I
> can sign his key.

He may use a name related to his email address to enter NM
(at least if you have sign his gpg key).

-- 
Rémi Vanicat
[EMAIL PROTECTED]
http://dept-info.labri.u-bordeaux.fr/~vanicat


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to