WebPKI and You
Summary
The article explains how WebPKI works, the roles of CAs and browsers, and why mechanisms like CT and OCSP matter. It covers high-profile revocation incidents (Trustico, Entrust, Microsoft), and argues for private/internal PKI options for critical infrastructure, plus practical recommendations for organizations.