Because we only trust keys stored within the ZTT, users can verify that each others’ public keys are included in the ZTT, before proceeding with using the keys.
Last updated 1 year ago