Hi Paul, At 13:17 23-10-2012, Paul Wouters wrote:
The hierarchical problem is pretty much an enigma case. If the root key or the com key ever gets abused, for instance by providing custom records with signatures to target someone specifically, and such a record ever leaks out for us to verify, they will lose that trust forever, and the
Yes. Regards,-sm
_______________________________________________ therightkey mailing list [email protected] https://www.ietf.org/mailman/listinfo/therightkey
