…of a file’s SHA256 fingerprint? If I have my terminology correct here…

  • manitcor@lemmy.intai.tech
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 year ago

    really its just different trust root authorities presuming we are still talking pk distribution infra involved here. alice and bob can of course always trade keys in other ways. if its distributed you have to root trust with a ledger (trust area: key ceremony, consensus protocol) or a CA (trust area: the CA chain, every step is another element of trust)