@bascule @ralphholz @ioerror @sleevi_ @fugueish Yes, that was done in the links you were given: http://www.ietf.org/mail-archive/web/trans/current/msg00233.html …
-
-
@bascule@taoeffect@ralphholz@ioerror Yes, a better presentation of an bad argument that completely ignores Section 5 of RFC 6962. :) -
@sleevi_@bascule@ralphholz@ioerror Be specific, what does it ignore? -
@sleevi_@bascule@ralphholz@ioerror (I reviewed that entire section.) -
@taoeffect@bascule@ralphholz@ioerror gossip. A compromised log key is detectable by clients. -
@sleevi_@taoeffect@bascule@ioerror Keep me in the loop, guys. (Disclaimer - I like CT)
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.