The protocol does not just compare keys ... and it's more consistent with the other protocols who also don't carry "key" anymore in their title. Moreover, it's more consistent with the attempt to integrate key verification into "general" work flows: "history verification" could be presented to the user as validating the integrity of shared communications between peers (after the fact).
The protocol does not just compare keys ... and it's more consistent with the other protocols who also don't carry "key" anymore in their title. Moreover, it's more consistent with the attempt to integrate key verification into "general" work flows: "history verification" could be presented to the user as validating the integrity of shared communications between peers (after the fact).