Andrei writes:
> What is not explicitly mentioned there is that you should also somehow
> establish that a specific key belongs to the person, e.g. by meeting
> in person and comparing key fingerprints (and some photo ID if you
> don't know each other).

Only if you require identification (a slippery thing) rather than
authentication.
-- 
John Hasler 
jhas...@newsguy.com
Elmwood, WI USA

Reply via email to