Date: Tue, 10 Oct 1995 16:26:24 -0400
From: Peter Williams <peter(_at_)verisign(_dot_)com>
Its interesting to watch how a cipherpunks mentality seek out
attack scenarios on security systems. Having worked their way
up breaking ciphers, key generation, key exchange, randomness, etc, some are
finally understanding that the key to an X.509 authentication framework
is the trust model. Break the key distribution, you break the
rest of the system. Break the public trust semantics, you break
public confidence. Noone will use the system, of course. pem-dev
has been through this debate many times.
Except as flame bait, I didn't quite understand your purpose in
posting this message to pem-dev?
- Ted