> Let me again bust this myth that 6962 / 6962-bis do anything to expose rogue > logs. Without some sort of consistency checking mechanism, logs can lie > without any risk of discovery. That is true of CT as deployed today. There > is no way to detect a rogue log.
It's necessary, but not sufficient. Just like TCP is necessary but not sufficient to enable the Web. ... One can compare three logs and if they differ you know who and where the rogue is, right? _______________________________________________ Trans mailing list [email protected] https://www.ietf.org/mailman/listinfo/trans
