Comment by nvy
1 year ago
Okay so we've established there must be a central registry, since it's a certainty that somebody's 65 year old mom will lose her phone and her certs and keys with it.
How does your system protect against attackers claiming to be my mom?
No comments yet
Contribute on Hacker News ↗