> Let me again bust this myth that 6962 / 6962-bis do anything to expose rogue 
> logs.  Without some sort of consistency checking mechanism, logs can lie 
> without any risk of discovery.  That is true of CT as deployed today.  There 
> is no way to detect a rogue log.

It's necessary, but not sufficient.  Just like TCP is necessary but not 
sufficient to enable the Web. ...

One can compare three logs and if they differ you know who and where the rogue 
is, right?
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to