On 11/17/12 10:57 PM, "Paul Wouters" <[email protected]> wrote:

>But allowing anyone to submit "new" certificates, allows hackers to do
>the same. How is this authenticated?

For CT, by chaining to a given set of roots.  


_______________________________________________
therightkey mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to