Why did the PGP Web of Trust fail?

1. The PGP Certificate

A User ID packet consists of UTF-8 text that is intended to represent the name and email address of the key holder.  By convention, it includes an RFC2822 mail name-addr, but there are no restrictions on its content.  The packet length in the header specifies the length of the User ID.

2. Key Signing Parties

Image of the Key Signing Event at a Key Signing Party (Picture from Wikipedia)

3. The PGP Web of Trust (WoT)

4. Limitations of the PGP WoT

4.1 Each Attribute requires a different verification skill

Illustration of an Institutional Web Trust with explanatory text here.

4.2 The missing Institutions

5. Conclusion

--

--

--

is writing his PhD on http://co-operating.systems/ . A Social Web Architect, he develops in Scala ideas guided by Philosophy, and a little Category Theory.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Gearbox DAO: Retroactive Public Contributions Funding & Jan Recap

Top 5 New Open Source Security Vulnerabilities in March 2019

THE EUROPEAN COMMISSION ACHIEVEMENT

Risk Management vs. Threat Intelligence-Driven Security Programs

A Starting Point: Transversal Questions and Recommendations for Montreal’s Digital Data Charter

The skyscrapers of Montreal as seen from Mount Royal, in the fall, under a blue sky with a few white clouds.

Supercharging a cheap GPS Tracker — Part 1: Hardware

{UPDATE} Pop Balloon Fun Hack Free Resources Generator

Matter security model

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Henry Story

Henry Story

is writing his PhD on http://co-operating.systems/ . A Social Web Architect, he develops in Scala ideas guided by Philosophy, and a little Category Theory.

More from Medium

Most enterprise companies are not prepared for 5th and 6th generation cyber-attacks; here’s why

AI/ML (Livin’) on the Edge…

EpochClock

Social Sciences to Cybersecurity