On 27 March 2014 05:57, Joseph Bonneau <[email protected]> wrote: > If the community doesn't think building such an auditing system buys much > perhaps it's a waste of engineering effort better spent elsewhere, because > the cost of running this would not be zero.
I think that raising the visibility of a targeted attack by the otherwise-trusted authority is vital to any kind of discovery system for identifier-to-key mappings. How else do you avoid the CA scenario all over again? _______________________________________________ Messaging mailing list [email protected] https://moderncrypto.org/mailman/listinfo/messaging
