Andrei writes: > What is not explicitly mentioned there is that you should also somehow > establish that a specific key belongs to the person, e.g. by meeting > in person and comparing key fingerprints (and some photo ID if you > don't know each other).
Only if you require identification (a slippery thing) rather than authentication. -- John Hasler jhas...@newsguy.com Elmwood, WI USA