X-Git-Url: https://codewiz.org/gitweb?a=blobdiff_plain;f=website%2Ftrust-models.mdwn;h=37928ebd52f4f8759f53fefc9cd00bbbc971adc3;hb=ae9d399c0873f2444f7297a00a77b04076b8021c;hp=8fee5cbe9f7a0d2eb153574c1384d329445f3e2f;hpb=abf33792b4aeeabb582bfe59f66079a9c12b24b6;p=monkeysphere.git diff --git a/website/trust-models.mdwn b/website/trust-models.mdwn index 8fee5cb..37928eb 100644 --- a/website/trust-models.mdwn +++ b/website/trust-models.mdwn @@ -1,4 +1,4 @@ -[[meta title="OpenPGP Trust Models"]] +[[!meta title="OpenPGP Trust Models"]] # OpenPGP Trust Models # @@ -6,11 +6,11 @@ Monkeysphere relies on GPG's definition of the OpenPGP web of trust, so it's important to understand how GPG calculates User ID validity for a key. -The basic question asked is: For a given User ID on a specific key, -given some set of valid certifications (signatures), and some explicit -statements about whose certifications you think are trustworthy -(ownertrust), should we consider this User ID to be legitimately -attached to this key (a "valid" User ID)? +The basic question that a trust model tries to answer is: For a given +User ID on a specific key, given some set of valid certifications +(signatures), and some explicit statements about whose certifications +you think are trustworthy (ownertrust), should we consider this User +ID to be legitimately attached to this key (a "valid" User ID)? It's worth noting that there are two integral parts in this calculation: @@ -133,7 +133,7 @@ formally public by publishing the trust signature to any keyserver. If you trust my judgement in this area ([the spec](http://tools.ietf.org/html/rfc4880#section-5.2.3.13) calls my -role in this scenario a "meta introducer"), then you should be able to +role in this scenario a "!meta introducer"), then you should be able to automatically accept certifications made by my sister by creating a level 2 trust signature on my key. You can choose whether to publish this trust signature or not, but as long as your `gpg` instance knows