07/05/2019 21:06, Stephen Hemminger:
> Thomas Monjalon <tho...@monjalon.net> wrote:
> 
> > In case a vulnerability is discovered, the process to follow
> > is described in this document.
[...]
> Maybe there should be a keysigning at the DPDK summit

Yes it is must for using GPG in the security process.


Reply via email to