| Posted by , under Uncategorized

Here we are conversing with Ryan at Google, I must admit this has been a very healthy discussion where opinions are expressed and ideas are shared…..and few blogs later we arrive at crossroads……

-Do we (as the computer industry) accelerate investment (I say accelerate as there is already a momentum)

| Posted by , under Uncategorized

We continue to exchange ideas, information and photos… And here is my latest response to the latest response

First of all, the author is unaware that my company has built the most sophisticated Certificate Management system that can automatically request, issue, renew and manage the whole lifecycle of the certificate.

| Posted by , under Uncategorized

My response to a recent blog has resulted in a quick response that I feel obliged to respond.

First of all, the positive: Agreement on the need to invest on a new revocation infrastructure.

“Basically, I see the value in revocation checking and think the investments need to be made

| Posted by , under Uncategorized

Some in the industry have responded to my post about the need for the revocation infrastructure.

They put forward an argument defending the need for short lived certificates by saying: “the main reason for them is to address the issue of key compromise“. ¬†They followed it by “The most important thing

| Posted by , under Uncategorized

There is much talk on the web about Encryption lately. There has been much talk about whether CAs (Certification Authorities) should care who they enable with encryption or not.

I will attempt at clarifying these issues, as I see the world of PKI and encryption.

So what is Encryption:

the process