From 12bde236c6e156c2ad41a27109ebe091a184509c Mon Sep 17 00:00:00 2001 From: Rasmus Dahlberg Date: Thu, 7 Oct 2021 18:56:39 +0200 Subject: emphasized that monitors look for unwanted key-usage --- doc/.design.md.swp | Bin 36864 -> 0 bytes doc/design.md | 2 +- 2 files changed, 1 insertion(+), 1 deletion(-) delete mode 100644 doc/.design.md.swp diff --git a/doc/.design.md.swp b/doc/.design.md.swp deleted file mode 100644 index 8d9f93a..0000000 Binary files a/doc/.design.md.swp and /dev/null differ diff --git a/doc/design.md b/doc/design.md index 57bc919..d1f7864 100644 --- a/doc/design.md +++ b/doc/design.md @@ -333,7 +333,7 @@ It also keeps log operations simpler because there are fewer bytes to manage. Verifiers interact with the logs indirectly through their signer's existing distribution mechanism. Signers are responsible for logging signed checksums and distributing necessary proofs of public logging. Monitor discover signed -checksums in the logs, generating alerts if use-case specific claims are false. +checksums in the logs, generating alerts if any key-usage is inappropriate. ### 4 - Frequently Asked Questions #### 4.1 - What parts of the design are we still thinking about? -- cgit v1.2.3