logoalt Hacker News

leni536yesterday at 10:31 PM1 replyview on HN

How do you compare? What trusted channel do you use to retrieve the real public key?


Replies

washingupliquidyesterday at 11:31 PM

Public keys go over untrusted channels. That's why they're public.

I'm not confident you understand how crypto works.

You do realize the entire threat model here is a house of cards perched atop someone else's software hosted on someone else's hardware all of which you implicitly trust and discard in favor of some unlikely cloak and dagger interception scheme.

show 1 reply