Yes, from the point they get the identity issuer private key…
…at least theoretically. I should probably point out that actually mounting that attack is, uh, complex.
Great reason to automate quickly rotating the identity issuer!
Yes, from the point they get the identity issuer private key…
…at least theoretically. I should probably point out that actually mounting that attack is, uh, complex.
Great reason to automate quickly rotating the identity issuer!