Introduction
Introduction Statistics Contact Development Disclaimer Help
Post As3V9NGsgRvtw61d8S by [email protected]
More posts by [email protected]
Post #As3V9Mjuf1YsHqbIkS by [email protected]
0 likes, 0 repeats
Every TPM has an endorsement key, which is used to prove that a key was generat…
Post #As3V9Msm84eOjKkNYu by [email protected]
0 likes, 0 repeats
Back when I was at Google we wanted to use this to put machine Identity keys in…
Post #As3V9N1HcRSL9ijAp6 by [email protected]
0 likes, 0 repeats
We could maybe have worked around this by storing a set of hashes of trusted ce…
Post #As3V9N959Rh7XuNOym by [email protected]
0 likes, 0 repeats
@mjg59 @sleevi that makes me think of RPKI (i.e. X.509 for BGP) and how ARIN us…
Post #As3V9NGsgRvtw61d8S by [email protected]
0 likes, 1 repeats
@grawity @mjg59 The Web PKI started similarly, although root programs evolved i…
Post #As59UMT93HbQr0Hepk by [email protected]
0 likes, 1 repeats
@mjg59 @sleevi In the Web PKI I feel like this could be pretty quickly resolved…
Post #AsAJQbvVbsrCy5CV6W by [email protected]
0 likes, 0 repeats
@sleevi oh, is that law also why e.g. old Verisign roots used to have that &quo…
Post #AsAJQc4N4vwjPZLZuy by [email protected]
0 likes, 1 repeats
@grawity Yup on both points.The Federal PKI Bridge is an application of the X.5…
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.