Trust Networks are Networks that Work Properly.
But any trust violation must be examined.
We can use cryptographic techniques for authentication.
For example I could make a hash, say
and you could include this in any email you send.
You could pass this to people
that you trust
if you send me an email, this will authenticate them as your friend. I will then send out new hashes, from time to time anyway, so that a lost hash has limited value. I will then maintain a hash database, listing hashes and who they belong to. If you own a hash from me, you choose who uses it, and if it is compromised, you tell me, and I mark it unsafe.
We each have a short list of names, such as 'John', 'John David Allsup', 'Doctor John Allsup from Exeter', 'Shadow Executor Chalisque' and so on. Within this network, which I call The System, we decide who owns each chosen name. This is important. Likewise with internet URI's such as
This can be done in a way
which is easy to learn
if you follow my example.