In fact, it's better if [public keys] are widely … public key really belongs to whom it appears … [For example,] Charlie has infiltrated the [bulletin board system] and generated … his bogus key in place of Alice's real … [Now all messages to Alice can be read by Charlie before forwarding to Alice.] … [p. 26] The only way to prevent this disaster …
Google-1
Google-2
Copyright clearance needed for quotation.