Hacker News new | past | comments | ask | show | jobs | submit login

I don't know a lot about this, but have recently being using PGP in an application. I asked GPT4 to compare

> Raw Public Keys, as specified in RFC 7250, allow for the exchange of public keys directly within the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols, bypassing the need for certificates 1 . In contrast, in a PGP (Pretty Good Privacy) architecture, public keys are often hosted on key servers or distributed through other means. The hosting of public keys facilitates their discovery and distribution to other users, which is essential for the operation of the PGP system. This hosted approach in PGP contrasts with the direct exchange of raw public keys in TLS/DTLS as outlined in RFC 7250.

> Raw Public Keys, trust is often established through out-of-band mechanisms or prior arrangements, since there's no certificate to provide a chain of trust. In PGP, trust is commonly established through a "Web of Trust" where users validate each other's keys based on personal trust relationships, or through certificate authorities in a more centralized trust model. Both systems require a way to ensure the authenticity and integrity of the public keys to prevent man-in-the-middle attacks or other forms of security compromises.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: