-"You may also see public keys referred to by their key ID, which is simply "
-"the last eight digits of the fingerprint, like C09A61E8 for Edward. The key "
-"ID is visible directly from the Key Management window. This key ID is like a "
-"person's first name (it is a useful shorthand but may not be unique to a "
-"given key), whereas the fingerprint actually identifies the key uniquely "
-"without the possibility of confusion. If you only have the key ID, you can "
-"still look up the key (as well as its fingerprint), like you did in Step 3, "
-"but if multiple options appear, you'll need the fingerprint of the person to "
-"whom you are trying to communicate to verify which one to use."
+"You may also see public keys referred to by a shorter key ID. This key ID is "
+"visible directly from the Key Management window. These eight character key "
+"IDs were previously used for identification, which used to be safe, but is "
+"no longer reliable. You need to check the full fingerprint as part of "
+"verifying you have the correct key for the person you are trying to "
+"contact. Spoofing, in which someone intentionally generates a key with a "
+"fingerprint whose final eight characters are the same as another, is "
+"unfortunately common."