On Sun, Jul 21, 2024 at 6:10 PM Kyle Nekritz wrote:
> On the surveillance risks, what differentiates trust negotiations from
> other existing negotiation mechanisms? Any negotiation mechanism comes with
> risks that it will be used to negotiate something problematic. It's not
> clear to me why tr
On the surveillance risks, what differentiates trust negotiations from other
existing negotiation mechanisms? Any negotiation mechanism comes with risks
that it will be used to negotiate something problematic. It's not clear to me
why trust negotiation is significantly different in this regard t
On 20/07/2024 11:23, David Benjamin wrote:
On Sat, Jul 20, 2024, 06:13 Mike Shaver wrote:
In what way are these non-web systems not allowed to use other PKI
models today? How would trust anchors provide that permission?
If the same server serves both embedded/IoT traffic and web bro
> Yes, if one drops usecases that are valuable to simplify stuff, later
> adding mechanism for those usecases ends up more complex than if one
> had just gone with the originally more complex solution.
>
> And it might be worse than just supporting both: The features could
> interact in bad ways. F