Stan Tobias <st...@privatdemail.net> wrote:
>Peter Lebbing <pe...@digitalbrains.com> wrote:
>> On 24/10/13 01:15, Stan Tobias wrote:
>> > , then why do we believe WoT authenticates anything?  Why do we
>accept, for
>> > example, a conversation by telephone to validate a key fingerprint?
>>
>> Because these are verifications outside the Web of Trust.
>
>Is that the only requirement?  Then I have fantastic news for you!

The idea of using a different channel for confirming key details such as a key 
fingerprint is really a way of trying to avoid a man-in-the-middle attack on 
the verification of the key and its UIDs.  It is not entirely 
foolproof--nothing is.

It isn't any more complicated or foreign than if your friend sends you an 
attachment in an email and you call him, send him an SMS message, or talk to 
him face-to-face to confirm that the message was him before you open it.

Cheers,

--Paul 
--
PGP: 3DB6D884

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to