A hard look at Certificate Transparency, Part I: Transparency Systems

from blog Educated Guesswork, | ↗ original
Identifying the communicating endpoints is a key requirement for nearly every security protocol. You can have the best crypto in the world, but if you aren't able to authenticate your peer, then you are vulnerable to impersonation attacks. If the peers have communicated before, it is sometimes possible to authenticate directly, but this doesn't...