logoalt Hacker News

mrexcesstoday at 11:18 AM0 repliesview on HN

Web of trust or centralized trust are the main answers here.

Compromise of the secret key is a whole other issue - revocation.

MITM of a key can be solved pretty well via web of trust techniques.

Apologies if the dialog is frustrating to read! As a “recovering cypherpunk”, I find these sorts of discussions animating, as long as they’re polite and technically focused! Much love!