07/05/2019 21:06, Stephen Hemminger: > Thomas Monjalon <tho...@monjalon.net> wrote: > > > In case a vulnerability is discovered, the process to follow > > is described in this document. [...] > Maybe there should be a keysigning at the DPDK summit
Yes it is must for using GPG in the security process.