Skip to content

Policies and protocols for dealing with private keys #13

Open
@edsko

Description

@edsko

This should document things such as

  • Bootstrapping
  • Key thresholds
  • How many keys we have of each type
  • Key validity (expiry time)
  • Implications for key compromise
  • Who holds keys, and how should they store them.

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions