Early Assumptions
You know the people with whom you deal.
Names function as identifiers.
Therefore, if you learn the name of a keyholder you can make security decisions.
System security depends on the security and practices of the
CA.
Previous slide
Next slide
Back to first slide
View graphic version