Hacker News new | past | comments | ask | show | jobs | submit login

2. Even if that was a requirement, they can be faked just like the certificate.

Huh?





Looks like a complex attack, and "not all CAs will necessarily have their own log." and same for the converse too.


Legitimate SCTs can be used in attacks just as well (this will probably be the common case), as explained here:

https://news.ycombinator.com/item?id=9254713


Yes, CT would only allow detection. Revocation would be a different problem.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: