On 29/06, Manoj Srivastava wrote:

|       Actually, the real flaw seems to be that my email assumed that
|  the protocol was going to be used by people who had a modicum of
|  inductive reasoning.  The outline mentions just one ID in the key
|  being verified and signed, and I assumed that anyone this concerned
|  about security would realize that the same needed to be done for evey
|  ID one needed to verify.  Quite obviously I was mistaken in my
|  assumption.

Well, then why not talk about "id signing" instead of "key signing" which
exists but designates a completely different thing that also exists in GPG?

Reply via email to