When do we need cryptographic keys authenticity? What can we do to provide keys authenticity?
Cryptographic keys authenticity is a problem that I think only a few people encounter.
Based on what I understand, the most common way to solve this specific problem was to bind one’s private identity such as email/phone number/IP addresse… Continue reading When do we need cryptographic keys authenticity? What can we do to provide keys authenticity?