➢ Can you explain the comparison that I brought up regarding trusting the
CA? That is related to " the client’s willingness to let their traffic be
intercepted".
Subverting one CA cuts across a large scale of Internet traffic and might be
noticed or can be routed around. Certificate transparency helps prevent a
single CA from being coerced into misissuance. With this extension, someone
doesn’t have to coerce a CA or force victims to trust a new CA. Instead they
have to gain the cooperation of the origin(s) they are interested in. Further,
if you mix in a coerced/force-trusted CA, you don’t even need the origin’s
cooperation.
_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls