First page Back Continue Last page Graphics
Levels of Trust
Trust Interaction
-
- Carol (m/f)
-
- Alice (u/u) Tom (m/f) Katy (-/m) Jeff (-/-)
-
- Greg (m/f)
-
- Sandra (-/f)
-
- Example #4
-
- Two marginally trusted keys will introduce a fully validated key:
- -Carol's and Greg's keys fully validate Tom's key.
- -Greg's and Tom's keys can now fully validate Sandra's key.
- A marginally trusted key will introduce a marginally validated key:
- -Tom's key can now marginally validate Katy's key.
-
- Examples taken in part from The GNU Privacy Handbook