← Back to context

Comment by xorcist

11 years ago

Which root keys? The ones you store on your web server, which just got compromised?

Why would one store them there? Why not just use them to sign other keys that are actually used in online systems?

  • No, the question is what to do when you need to rotate them. Because that need will arise somewhere, globally, if we were to run the secure web on trust-on-first-use.

    It's not interesting why someone hypothetically did get their root keys compromised, it's interesting how the proposed system would cope with it.

    (Downvoting the question is not really a web scale way to build a global trust system.)