First page Back Continue Last page Graphics
Levels of Trust
Trust Interaction
-
- Carol (f/f)
-
- Alice (u/u) Tom (f/f) Katy (f/f) Jeff (-/-)
-
- Greg (-/f)
-
- Sandra (-/f)
-
- Example #5
-
- A fully trusted key will introduce a fully validated key:
- -Carol's key fully validates Tom's key.
- -Tom's key can now fully validate Sandra's and Katy's keys.
- Katy's key fails to validate Jeff's key due to path length.
-
-
- Examples taken in part from The GNU Privacy Handbook