"Okubo, Tomofumi" <tomokubo at verisign.com> writes: >[Can an attacker do X?] > >Yes (but can't get the keys). How do you reconcile those two? If an attacker can do all of the X things, what prevents them from getting the keys? Peter.