SourceThe keys and certificates that will underlie Let’s Encrypt have been generated. This was done during a key ceremony at a secure facility today. The following objects were created:
- Key pair and self-signed cert for the ISRG root
- Key pair and certificate for the ISRG root’s OCSP
- Key pairs and certificates for two Let’s Encrypt intermediate CAs
- CRL under the ISRG root showing that the Let’s Encrypt intermediates have not been revoked
Industry news items concerning VPNs, darknets, crypto, surveillance and secure computing.
1 post • Page 1 of 1