Hi Paul,
At 13:17 23-10-2012, Paul Wouters wrote:
The hierarchical problem is pretty much an enigma case. If the root key
or the com key ever gets abused, for instance by providing custom records
with signatures to target someone specifically, and such a record ever
leaks out for us to verify, they will lose that trust forever, and the

Yes.

Regards,
-sm
_______________________________________________
therightkey mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to