In part three I covered how chains of trust could be used by a signing service. But what happens if there are multiple signing services? Is it possible to create an executable which would be trusted by both root keys?
Continue Reading →
July 3, 2012
by Al
0 comments

