William Herrin wrote:

> The governments in question are watching for exfiltration and they
> largely use a less risky approach: they issue their own root key and,

That is a trusted first party.

                                                Masataka Ohta


Reply via email to