In which of the following scenarios is PKI LEAST hardened?
A.
The CRL is posted to a publicly accessible location.
B.
The recorded time offsets are developed with symmetric keys.
C.
A malicious CA certificate is loaded on all the clients.
D.
All public keys are accessed by an unauthorized user.
Enjoyed reading through this, very good stuff, thanks . “Be not careless in deeds, nor confused in words, nor rambling in thought.” by Marcus Aurelius Antoninus.