Get the latest tech news
Building a Transparent Keyserver
We apply a transparency log to a centralized keyserver step-by-step, in less than 500 lines, with privacy protections, anti-poisoning, and witness cosigning.
None
Or read this on Hacker NewsGet the latest tech news
We apply a transparency log to a centralized keyserver step-by-step, in less than 500 lines, with privacy protections, anti-poisoning, and witness cosigning.
None
Or read this on Hacker News