Peter Gutmann <[email protected]> writes: > Does anything actually use the cobweb of trust, or do you just assume the key > you've got is good because doing anything else is too hard?
Perhaps the Debian developer keyring would serve as a compelling example? They even organize actual key-signing parties, which many cryptography experts today appear to regard as "LARPing" or otherwise ridiculous.
