> Safer mechanisms of distributing and establishing "root" keys for identify verification
Except it doesn't solve the mitm problem, so its not really safer.
The ideas discussed in 1990s suggested a way to ensure that mitm guaranteed deviation from data transmitted. How well it would work in real life I have no idea
The ideas discussed in 1990s suggested a way to ensure that mitm guaranteed deviation from data transmitted. How well it would work in real life I have no idea