The System of Trust Networks — Part One

Trust Networks are Networks that Work Properly.

But any trust violation must be examined.

We can use cryptographic techniques for authentication.
For example I could make a hash, say


and you could include this in any email you send.

You could pass this to people that you trust so-that:
if you send me an email, this will authenticate them as your friend. I will then send out new hashes, from time to time anyway, so that a lost hash has limited value. I will then maintain a hash database, listing hashes and who they belong to. If you own a hash from me, you choose who uses it, and if it is compromised, you tell me, and I mark it unsafe.

We each have a short list of names, such as 'John', 'John David Allsup', 'Doctor John Allsup from Exeter', 'Shadow Executor Chalisque' and so on. Within this network, which I call The System, we decide who owns each chosen name. This is important. Likewise with internet URI's such as
a web address that I own. If we each have web-addresses we own, and we each maintain ownership, then we have a convention within TheSystem, so that we know who is authoritative.

This can be done in a way
which is easy to learn
if you follow my example.

Doctor John Allsup from Exeter