In which of the following scenarios is PKI LEAST hardened?
A.
The CRL is posted to a publicly accessible location.
B.
The recorded time offsets are developed with symmetric keys.
C.
A malicious CA certificate is loaded on all the clients.
D.
All public keys are accessed by an unauthorized user.