logoalt Hacker News

burnteyesterday at 7:26 PM0 repliesview on HN

The instant we bound encrypted connections with identity we failed. And decades later we're still living with the mistake.

I'm completely serious when we need to abandon the ID verification part of certificates. That's an entirely separate problem from encryption protocol. An encryption protocol needs absolutely no expiration date, it's useful until it's broken, and no one can predict that. Identity should be verified in a separate path.