Comment by ongy
11 days ago
Which either allows to use a fingerprint of the signing key to be used for the same.
Or would open the system up to the originally posted attack of providing ~an open relay.
11 days ago
Which either allows to use a fingerprint of the signing key to be used for the same.
Or would open the system up to the originally posted attack of providing ~an open relay.
No comments yet
Contribute on Hacker News ↗