First page Back Continue Last page Graphics
Levels of Trust
Trust Interaction 
- 
-                Carol (f/f)
 - 
 - Alice (u/u)                   Tom (f/f)     Katy (f/f)     Jeff (-/-)
 - 
 -  	         Greg (-/f)
 - 
 - 		                     Sandra (-/f)
 - 
 - Example #5
 - 
 - A fully trusted key will introduce a fully validated key:
 - 	-Carol's key fully validates Tom's key.
 - 	-Tom's key can now fully validate Sandra's and Katy's keys.
 - Katy's key fails to validate Jeff's key due to path length.
 - 
 - 
 - Examples taken in part from The GNU Privacy Handbook