On 11/17/12 10:57 PM, "Paul Wouters" <[email protected]> wrote:
>But allowing anyone to submit "new" certificates, allows hackers to do >the same. How is this authenticated? For CT, by chaining to a given set of roots. _______________________________________________ therightkey mailing list [email protected] https://www.ietf.org/mailman/listinfo/therightkey
