I haven't looked at the links yet, but what is your purpose? Do you
want to detect rogue keyservers in the keyserver network, or perhaps
attacks on keyservers?
There is no need to trust keyservers in the Web of Trust, or even in
TOFU (as I assume in the latter you got a signed message from the
Hello,
Sorry to bring this thread back from the dead, but now that I have a
preprint out I can elaborate a bit more on my motivations for this
previous discussion.
I've spent a little bit of time investigating the use of Tor to create
an interactive protocol for auditing keyservers, the idea bein