Mea Culpa. More transparency about Certificate Transparency -https://groups.google.com/a/chromium.org/d/msg/ct-policy/AH9JHYDljpU/f4I9vQLACwAJ …
-
-
Replying to @sleevi_
I do think it would be good to find a way to safely tolerate poorer availability, though. Running one is too expensive + risky now.
1 reply 0 retweets 0 likes -
Replying to @BRIAN_____
Risky? Untrusting a log is 'no big deal' and shouldn't carry risk. Expense? Depends.
1 reply 0 retweets 1 like -
Replying to @sleevi_
It is risky in the sense that your log can become useless overnight given even a small mistake.
1 reply 0 retweets 0 likes -
-
Replying to @sleevi_ @BRIAN_____
Maybe not risky to the broader PKI, but if the risk of disqual is high to the log owner, could suppress log creation.
2 replies 0 retweets 1 like -
Yes, exactly. Unlikely that you build a log and it's still trusted a year from now, w/o spending millions.
3 replies 0 retweets 0 likes
In particular it's pretty pointless to have every log using Google Cloud + AWS + CloudFlare, so even hosting/CDN is hard.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.