aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRasmus Dahlberg <rasmus.dahlberg@kau.se>2021-10-07 18:56:39 +0200
committerRasmus Dahlberg <rasmus.dahlberg@kau.se>2021-10-07 18:56:39 +0200
commit12bde236c6e156c2ad41a27109ebe091a184509c (patch)
treeb5c880f8adc4671ee3f12665d6db93f9daa30f09
parent72a7c79e55120b05aef7a8b356ee273984c7f1ce (diff)
emphasized that monitors look for unwanted key-usage
-rw-r--r--doc/.design.md.swpbin36864 -> 0 bytes
-rw-r--r--doc/design.md2
2 files changed, 1 insertions, 1 deletions
diff --git a/doc/.design.md.swp b/doc/.design.md.swp
deleted file mode 100644
index 8d9f93a..0000000
--- a/doc/.design.md.swp
+++ /dev/null
Binary files differ
diff --git a/doc/design.md b/doc/design.md
index 57bc919..d1f7864 100644
--- a/doc/design.md
+++ b/doc/design.md
@@ -333,7 +333,7 @@ It also keeps log operations simpler because there are fewer bytes to manage.
Verifiers interact with the logs indirectly through their signer's existing
distribution mechanism. Signers are responsible for logging signed checksums
and distributing necessary proofs of public logging. Monitor discover signed
-checksums in the logs, generating alerts if use-case specific claims are false.
+checksums in the logs, generating alerts if any key-usage is inappropriate.
### 4 - Frequently Asked Questions
#### 4.1 - What parts of the design are we still thinking about?