Thanks for putting that together, Steve. Reading through the doc it appears
that some of my concerns are addressed but I do have a few questions yet:
1) I saw that tucked away in section 10.3.2 item #3 is key reuse but all it
says is you have to promise not to do it. Is there any solid
I'm not sure I totally follow here because informed consent requires the ability to inform, and I don't think we have that yet.The way any attacker operates is to find gaps in a system and make use of them. In my questions I'm trying the same approach: what are some gaps in the Komodia solution
Thanks Peter.
Yes my bad..
https://cabforum.org/current-work/code-signing-working-group/ has the questions
e-mail at the bottom of the page.
Steve
-Original Message-
From: dev-security-policy [mailto:dev-security-policy-
bounces+steve.roylance=globalsign@lists.mozilla.org] On
On Wed, Feb 25, 2015 at 8:59 AM, Peter Kurrasch fhw...@gmail.com wrote:
I'm not sure I totally follow here because informed consent requires the
ability to inform, and I don't think we have that yet.
The way any attacker operates is to find gaps in a system and make use of
them. In my
Steve,
Unless Peter is a member of the forum, the public list is a black hole, as
only members can post. The alternative, the questions list, is not
publicly readable, so is also a bad choice for open discussion.
Therefore, while this thread is not the appropriate place, this forum is
probably
5 matches
Mail list logo