@BenAveling @mjg59 I was thinking of traditional PKI systems in particular, where a key is trusted if it is the root of trust, or signed by a key that is trusted to make signatures.
In that sense, the root of trust is trusted axiomatically.
@mjg59 you're going to write it anyway, and I'm going to read it. Good to get a good E2E explanation going, though.
Beyond a blogpost, when are you going to write an actual book that walks trust from end-to-end, answering the trust-analogous question to the interview question "you press enter after typing a URL, what happens? Can you go into more detail? More detail? More ...?"
Because I feel like you've got that book in you somewhere.
Does the blog post address the fact that "provide trust" was never the meaning?
Rather, "[unstated assumption all actors are operating in a single centralised one-way hierarchy of trust] this node is at the root of that trust hierarchy"
Please add me to the blogpost as a very interested person