id sid tid token lemma pos blog-dshr-org-7999 1 1 DSHR DSHR NNP blog-dshr-org-7999 1 2 's 's POS blog-dshr-org-7999 1 3 Blog blog NN blog-dshr-org-7999 1 4 : : : blog-dshr-org-7999 1 5 Certificate Certificate NNP blog-dshr-org-7999 1 6 Transparency Transparency NNP blog-dshr-org-7999 1 7 DSHR DSHR NNP blog-dshr-org-7999 1 8 's 's POS blog-dshr-org-7999 1 9 Blog Blog NNP blog-dshr-org-7999 1 10 I -PRON- PRP blog-dshr-org-7999 1 11 'm be VBP blog-dshr-org-7999 1 12 David David NNP blog-dshr-org-7999 1 13 Rosenthal Rosenthal NNP blog-dshr-org-7999 1 14 , , , blog-dshr-org-7999 1 15 and and CC blog-dshr-org-7999 1 16 this this DT blog-dshr-org-7999 1 17 is be VBZ blog-dshr-org-7999 1 18 a a DT blog-dshr-org-7999 1 19 place place NN blog-dshr-org-7999 1 20 to to TO blog-dshr-org-7999 1 21 discuss discuss VB blog-dshr-org-7999 1 22 the the DT blog-dshr-org-7999 1 23 work work NN blog-dshr-org-7999 1 24 I -PRON- PRP blog-dshr-org-7999 1 25 'm be VBP blog-dshr-org-7999 1 26 doing do VBG blog-dshr-org-7999 1 27 in in IN blog-dshr-org-7999 1 28 Digital Digital NNP blog-dshr-org-7999 1 29 Preservation Preservation NNP blog-dshr-org-7999 1 30 . . . blog-dshr-org-7999 2 1 Thursday Thursday NNP blog-dshr-org-7999 2 2 , , , blog-dshr-org-7999 2 3 November November NNP blog-dshr-org-7999 2 4 29 29 CD blog-dshr-org-7999 2 5 , , , blog-dshr-org-7999 2 6 2018 2018 CD blog-dshr-org-7999 2 7 Certificate Certificate NNP blog-dshr-org-7999 2 8 Transparency Transparency NNP blog-dshr-org-7999 2 9 Today Today NNP blog-dshr-org-7999 2 10 is be VBZ blog-dshr-org-7999 2 11 2018 2018 CD blog-dshr-org-7999 2 12 's 's POS blog-dshr-org-7999 2 13 World World NNP blog-dshr-org-7999 2 14 Digital Digital NNP blog-dshr-org-7999 2 15 Preservation Preservation NNP blog-dshr-org-7999 2 16 Day Day NNP blog-dshr-org-7999 2 17 . . . blog-dshr-org-7999 3 1 It -PRON- PRP blog-dshr-org-7999 3 2 might may MD blog-dshr-org-7999 3 3 appear appear VB blog-dshr-org-7999 3 4 that that IN blog-dshr-org-7999 3 5 this this DT blog-dshr-org-7999 3 6 post post NN blog-dshr-org-7999 3 7 has have VBZ blog-dshr-org-7999 3 8 little little JJ blog-dshr-org-7999 3 9 to to TO blog-dshr-org-7999 3 10 do do VB blog-dshr-org-7999 3 11 with with IN blog-dshr-org-7999 3 12 digital digital JJ blog-dshr-org-7999 3 13 preservation preservation NN blog-dshr-org-7999 3 14 . . . blog-dshr-org-7999 4 1 However however RB blog-dshr-org-7999 4 2 , , , blog-dshr-org-7999 4 3 I -PRON- PRP blog-dshr-org-7999 4 4 hope hope VBP blog-dshr-org-7999 4 5 that that IN blog-dshr-org-7999 4 6 the the DT blog-dshr-org-7999 4 7 long long JJ blog-dshr-org-7999 4 8 post post NN blog-dshr-org-7999 4 9 below below IN blog-dshr-org-7999 4 10 the the DT blog-dshr-org-7999 4 11 fold fold NN blog-dshr-org-7999 4 12 is be VBZ blog-dshr-org-7999 4 13 the the DT blog-dshr-org-7999 4 14 start start NN blog-dshr-org-7999 4 15 of of IN blog-dshr-org-7999 4 16 a a DT blog-dshr-org-7999 4 17 series series NN blog-dshr-org-7999 4 18 asking ask VBG blog-dshr-org-7999 4 19 the the DT blog-dshr-org-7999 4 20 simple simple JJ blog-dshr-org-7999 4 21 question question NN blog-dshr-org-7999 4 22 underlying underlie VBG blog-dshr-org-7999 4 23 not not RB blog-dshr-org-7999 4 24 just just RB blog-dshr-org-7999 4 25 digital digital JJ blog-dshr-org-7999 4 26 preservation preservation NN blog-dshr-org-7999 4 27 , , , blog-dshr-org-7999 4 28 but but CC blog-dshr-org-7999 4 29 many many JJ blog-dshr-org-7999 4 30 areas area NNS blog-dshr-org-7999 4 31 of of IN blog-dshr-org-7999 4 32 the the DT blog-dshr-org-7999 4 33 digital digital JJ blog-dshr-org-7999 4 34 world world NN blog-dshr-org-7999 4 35 , , , blog-dshr-org-7999 4 36 " " '' blog-dshr-org-7999 4 37 how how WRB blog-dshr-org-7999 4 38 do do VBP blog-dshr-org-7999 4 39 I -PRON- PRP blog-dshr-org-7999 4 40 know know VB blog-dshr-org-7999 4 41 this this DT blog-dshr-org-7999 4 42 digital digital JJ blog-dshr-org-7999 4 43 content content NN blog-dshr-org-7999 4 44 is be VBZ blog-dshr-org-7999 4 45 real real JJ blog-dshr-org-7999 4 46 ? ? . blog-dshr-org-7999 4 47 " " '' blog-dshr-org-7999 5 1 It -PRON- PRP blog-dshr-org-7999 5 2 is be VBZ blog-dshr-org-7999 5 3 another another DT blog-dshr-org-7999 5 4 of of IN blog-dshr-org-7999 5 5 the the DT blog-dshr-org-7999 5 6 many many JJ blog-dshr-org-7999 5 7 problems problem NNS blog-dshr-org-7999 5 8 for for IN blog-dshr-org-7999 5 9 which which WDT blog-dshr-org-7999 5 10 blockchain blockchain NNP blog-dshr-org-7999 5 11 is be VBZ blog-dshr-org-7999 5 12 touted tout VBN blog-dshr-org-7999 5 13 as as IN blog-dshr-org-7999 5 14 a a DT blog-dshr-org-7999 5 15 solution solution NN blog-dshr-org-7999 5 16 by by IN blog-dshr-org-7999 5 17 people people NNS blog-dshr-org-7999 5 18 lacking lack VBG blog-dshr-org-7999 5 19 real real JJ blog-dshr-org-7999 5 20 - - HYPH blog-dshr-org-7999 5 21 world world NN blog-dshr-org-7999 5 22 understanding understanding NN blog-dshr-org-7999 5 23 of of IN blog-dshr-org-7999 5 24 either either CC blog-dshr-org-7999 5 25 the the DT blog-dshr-org-7999 5 26 problem problem NN blog-dshr-org-7999 5 27 or or CC blog-dshr-org-7999 5 28 the the DT blog-dshr-org-7999 5 29 technology technology NN blog-dshr-org-7999 5 30 , , , blog-dshr-org-7999 5 31 or or CC blog-dshr-org-7999 5 32 both both DT blog-dshr-org-7999 5 33 . . . blog-dshr-org-7999 6 1 In in IN blog-dshr-org-7999 6 2 this this DT blog-dshr-org-7999 6 3 post post NN blog-dshr-org-7999 6 4 I -PRON- PRP blog-dshr-org-7999 6 5 'm be VBP blog-dshr-org-7999 6 6 going go VBG blog-dshr-org-7999 6 7 to to TO blog-dshr-org-7999 6 8 look look VB blog-dshr-org-7999 6 9 in in IN blog-dshr-org-7999 6 10 some some DT blog-dshr-org-7999 6 11 detail detail NN blog-dshr-org-7999 6 12 at at IN blog-dshr-org-7999 6 13 Certificate Certificate NNP blog-dshr-org-7999 6 14 Transparency Transparency NNP blog-dshr-org-7999 6 15 , , , blog-dshr-org-7999 6 16 an an DT blog-dshr-org-7999 6 17 important important JJ blog-dshr-org-7999 6 18 initiative initiative NN blog-dshr-org-7999 6 19 aimed aim VBN blog-dshr-org-7999 6 20 at at IN blog-dshr-org-7999 6 21 improving improve VBG blog-dshr-org-7999 6 22 security security NN blog-dshr-org-7999 6 23 and and CC blog-dshr-org-7999 6 24 authenticity authenticity NN blog-dshr-org-7999 6 25 on on IN blog-dshr-org-7999 6 26 the the DT blog-dshr-org-7999 6 27 Web web NN blog-dshr-org-7999 6 28 , , , blog-dshr-org-7999 6 29 and and CC blog-dshr-org-7999 6 30 relate relate VB blog-dshr-org-7999 6 31 the the DT blog-dshr-org-7999 6 32 techniques technique NNS blog-dshr-org-7999 6 33 it -PRON- PRP blog-dshr-org-7999 6 34 uses use VBZ blog-dshr-org-7999 6 35 to to IN blog-dshr-org-7999 6 36 those those DT blog-dshr-org-7999 6 37 underlying underlie VBG blog-dshr-org-7999 6 38 the the DT blog-dshr-org-7999 6 39 LOCKSS LOCKSS NNP blog-dshr-org-7999 6 40 system system NN blog-dshr-org-7999 6 41 . . . blog-dshr-org-7999 7 1 In in IN blog-dshr-org-7999 7 2 the the DT blog-dshr-org-7999 7 3 next next JJ blog-dshr-org-7999 7 4 post post NN blog-dshr-org-7999 7 5 I -PRON- PRP blog-dshr-org-7999 7 6 plan plan VBP blog-dshr-org-7999 7 7 to to TO blog-dshr-org-7999 7 8 ask ask VB blog-dshr-org-7999 7 9 how how WRB blog-dshr-org-7999 7 10 these these DT blog-dshr-org-7999 7 11 techniques technique NNS blog-dshr-org-7999 7 12 could could MD blog-dshr-org-7999 7 13 be be VB blog-dshr-org-7999 7 14 applied apply VBN blog-dshr-org-7999 7 15 to to IN blog-dshr-org-7999 7 16 other other JJ blog-dshr-org-7999 7 17 areas area NNS blog-dshr-org-7999 7 18 in in IN blog-dshr-org-7999 7 19 which which WDT blog-dshr-org-7999 7 20 authenticity authenticity NN blog-dshr-org-7999 7 21 is be VBZ blog-dshr-org-7999 7 22 important important JJ blog-dshr-org-7999 7 23 , , , blog-dshr-org-7999 7 24 such such JJ blog-dshr-org-7999 7 25 as as IN blog-dshr-org-7999 7 26 in in IN blog-dshr-org-7999 7 27 the the DT blog-dshr-org-7999 7 28 software software NN blog-dshr-org-7999 7 29 supply supply NN blog-dshr-org-7999 7 30 chain chain NN blog-dshr-org-7999 7 31 . . . blog-dshr-org-7999 8 1 Certificate Certificate NNP blog-dshr-org-7999 8 2 Transparency transparency NN blog-dshr-org-7999 8 3 How how WRB blog-dshr-org-7999 8 4 do do VBP blog-dshr-org-7999 8 5 I -PRON- PRP blog-dshr-org-7999 8 6 know know VB blog-dshr-org-7999 8 7 that that IN blog-dshr-org-7999 8 8 I -PRON- PRP blog-dshr-org-7999 8 9 'm be VBP blog-dshr-org-7999 8 10 talking talk VBG blog-dshr-org-7999 8 11 to to IN blog-dshr-org-7999 8 12 the the DT blog-dshr-org-7999 8 13 right right JJ blog-dshr-org-7999 8 14 Web web NN blog-dshr-org-7999 8 15 site site NN blog-dshr-org-7999 8 16 ? ? . blog-dshr-org-7999 9 1 Because because IN blog-dshr-org-7999 9 2 there there EX blog-dshr-org-7999 9 3 's be VBZ blog-dshr-org-7999 9 4 a a DT blog-dshr-org-7999 9 5 closed closed JJ blog-dshr-org-7999 9 6 padlock padlock NN blog-dshr-org-7999 9 7 icon icon NN blog-dshr-org-7999 9 8 in in IN blog-dshr-org-7999 9 9 the the DT blog-dshr-org-7999 9 10 URL URL NNP blog-dshr-org-7999 9 11 bar bar NN blog-dshr-org-7999 9 12 , , , blog-dshr-org-7999 9 13 right right JJ blog-dshr-org-7999 9 14 ? ? . blog-dshr-org-7999 10 1 Mozilla Mozilla NNP blog-dshr-org-7999 10 2 says say VBZ blog-dshr-org-7999 10 3 : : : blog-dshr-org-7999 10 4 A a DT blog-dshr-org-7999 10 5 green green JJ blog-dshr-org-7999 10 6 padlock padlock NN blog-dshr-org-7999 10 7 ( ( -LRB- blog-dshr-org-7999 10 8 with with IN blog-dshr-org-7999 10 9 or or CC blog-dshr-org-7999 10 10 without without IN blog-dshr-org-7999 10 11 an an DT blog-dshr-org-7999 10 12 organization organization NN blog-dshr-org-7999 10 13 name name NN blog-dshr-org-7999 10 14 ) ) -RRB- blog-dshr-org-7999 10 15 indicates indicate VBZ blog-dshr-org-7999 10 16 that that DT blog-dshr-org-7999 10 17 : : : blog-dshr-org-7999 10 18 You -PRON- PRP blog-dshr-org-7999 10 19 are be VBP blog-dshr-org-7999 10 20 definitely definitely RB blog-dshr-org-7999 10 21 connected connected JJ blog-dshr-org-7999 10 22 to to IN blog-dshr-org-7999 10 23 the the DT blog-dshr-org-7999 10 24 website website NN blog-dshr-org-7999 10 25 whose whose WP$ blog-dshr-org-7999 10 26 address address NN blog-dshr-org-7999 10 27 is be VBZ blog-dshr-org-7999 10 28 shown show VBN blog-dshr-org-7999 10 29 in in IN blog-dshr-org-7999 10 30 the the DT blog-dshr-org-7999 10 31 address address NN blog-dshr-org-7999 10 32 bar bar NN blog-dshr-org-7999 10 33 ; ; : blog-dshr-org-7999 10 34 the the DT blog-dshr-org-7999 10 35 connection connection NN blog-dshr-org-7999 10 36 has have VBZ blog-dshr-org-7999 10 37 not not RB blog-dshr-org-7999 10 38 been be VBN blog-dshr-org-7999 10 39 intercepted intercept VBN blog-dshr-org-7999 10 40 . . . blog-dshr-org-7999 11 1 The the DT blog-dshr-org-7999 11 2 connection connection NN blog-dshr-org-7999 11 3 between between IN blog-dshr-org-7999 11 4 Firefox Firefox NNP blog-dshr-org-7999 11 5 and and CC blog-dshr-org-7999 11 6 the the DT blog-dshr-org-7999 11 7 website website NN blog-dshr-org-7999 11 8 is be VBZ blog-dshr-org-7999 11 9 encrypted encrypt VBN blog-dshr-org-7999 11 10 to to TO blog-dshr-org-7999 11 11 prevent prevent VB blog-dshr-org-7999 11 12 eavesdropping eavesdropping NN blog-dshr-org-7999 11 13 . . . blog-dshr-org-7999 12 1 The the DT blog-dshr-org-7999 12 2 padlock padlock NN blog-dshr-org-7999 12 3 icon icon NN blog-dshr-org-7999 12 4 appears appear VBZ blog-dshr-org-7999 12 5 when when WRB blog-dshr-org-7999 12 6 the the DT blog-dshr-org-7999 12 7 browser browser NN blog-dshr-org-7999 12 8 has have VBZ blog-dshr-org-7999 12 9 validated validate VBN blog-dshr-org-7999 12 10 that that IN blog-dshr-org-7999 12 11 the the DT blog-dshr-org-7999 12 12 connection connection NN blog-dshr-org-7999 12 13 to to IN blog-dshr-org-7999 12 14 the the DT blog-dshr-org-7999 12 15 URL url NN blog-dshr-org-7999 12 16 in in IN blog-dshr-org-7999 12 17 the the DT blog-dshr-org-7999 12 18 URL URL NNP blog-dshr-org-7999 12 19 bar bar NN blog-dshr-org-7999 12 20 supplied supply VBD blog-dshr-org-7999 12 21 a a DT blog-dshr-org-7999 12 22 certificate certificate NN blog-dshr-org-7999 12 23 for for IN blog-dshr-org-7999 12 24 the the DT blog-dshr-org-7999 12 25 site site NN blog-dshr-org-7999 12 26 in in IN blog-dshr-org-7999 12 27 question question NN blog-dshr-org-7999 12 28 carrying carry VBG blog-dshr-org-7999 12 29 a a DT blog-dshr-org-7999 12 30 signature signature NN blog-dshr-org-7999 12 31 chain chain NN blog-dshr-org-7999 12 32 ending end VBG blog-dshr-org-7999 12 33 in in IN blog-dshr-org-7999 12 34 one one CD blog-dshr-org-7999 12 35 of of IN blog-dshr-org-7999 12 36 the the DT blog-dshr-org-7999 12 37 root root NN blog-dshr-org-7999 12 38 certificates certificate VBZ blog-dshr-org-7999 12 39 the the DT blog-dshr-org-7999 12 40 browser browser NN blog-dshr-org-7999 12 41 trusts trust VBZ blog-dshr-org-7999 12 42 . . . blog-dshr-org-7999 13 1 Browsers browser NNS blog-dshr-org-7999 13 2 come come VBP blog-dshr-org-7999 13 3 with with IN blog-dshr-org-7999 13 4 a a DT blog-dshr-org-7999 13 5 default default NN blog-dshr-org-7999 13 6 list list NN blog-dshr-org-7999 13 7 of of IN blog-dshr-org-7999 13 8 root root NN blog-dshr-org-7999 13 9 certificates certificate NNS blog-dshr-org-7999 13 10 from from IN blog-dshr-org-7999 13 11 Certificate Certificate NNP blog-dshr-org-7999 13 12 Authorities Authorities NNPS blog-dshr-org-7999 13 13 ( ( -LRB- blog-dshr-org-7999 13 14 CAs CAs NNP blog-dshr-org-7999 13 15 ) ) -RRB- blog-dshr-org-7999 13 16 . . . blog-dshr-org-7999 14 1 Two two CD blog-dshr-org-7999 14 2 years year NNS blog-dshr-org-7999 14 3 ago ago RB blog-dshr-org-7999 14 4 in in IN blog-dshr-org-7999 14 5 The the DT blog-dshr-org-7999 14 6 Curious curious JJ blog-dshr-org-7999 14 7 Case Case NNP blog-dshr-org-7999 14 8 of of IN blog-dshr-org-7999 14 9 the the DT blog-dshr-org-7999 14 10 Outsourced outsource VBN blog-dshr-org-7999 14 11 CA CA NNP blog-dshr-org-7999 14 12 I -PRON- PRP blog-dshr-org-7999 14 13 wrote write VBD blog-dshr-org-7999 14 14 about about IN blog-dshr-org-7999 14 15 this this DT blog-dshr-org-7999 14 16 list list NN blog-dshr-org-7999 14 17 : : : blog-dshr-org-7999 14 18 The the DT blog-dshr-org-7999 14 19 list list NN blog-dshr-org-7999 14 20 of of IN blog-dshr-org-7999 14 21 CAs CAs NNP blog-dshr-org-7999 14 22 that that WDT blog-dshr-org-7999 14 23 my -PRON- PRP$ blog-dshr-org-7999 14 24 Firefox Firefox NNP blog-dshr-org-7999 14 25 trusts trust NNS blog-dshr-org-7999 14 26 is be VBZ blog-dshr-org-7999 14 27 here here RB blog-dshr-org-7999 14 28 , , , blog-dshr-org-7999 14 29 all all DT blog-dshr-org-7999 14 30 188 188 CD blog-dshr-org-7999 14 31 of of IN blog-dshr-org-7999 14 32 them -PRON- PRP blog-dshr-org-7999 14 33 . . . blog-dshr-org-7999 15 1 Note note VB blog-dshr-org-7999 15 2 that that IN blog-dshr-org-7999 15 3 because because IN blog-dshr-org-7999 15 4 GeoTrust GeoTrust NNP blog-dshr-org-7999 15 5 is be VBZ blog-dshr-org-7999 15 6 in in IN blog-dshr-org-7999 15 7 the the DT blog-dshr-org-7999 15 8 list list NN blog-dshr-org-7999 15 9 , , , blog-dshr-org-7999 15 10 it -PRON- PRP blog-dshr-org-7999 15 11 can can MD blog-dshr-org-7999 15 12 certify certify VB blog-dshr-org-7999 15 13 its -PRON- PRP$ blog-dshr-org-7999 15 14 own own JJ blog-dshr-org-7999 15 15 website website NN blog-dshr-org-7999 15 16 . . . blog-dshr-org-7999 16 1 I -PRON- PRP blog-dshr-org-7999 16 2 wrote write VBD blog-dshr-org-7999 16 3 about about IN blog-dshr-org-7999 16 4 the the DT blog-dshr-org-7999 16 5 issues issue NNS blog-dshr-org-7999 16 6 around around IN blog-dshr-org-7999 16 7 CAs ca NNS blog-dshr-org-7999 16 8 back back RB blog-dshr-org-7999 16 9 in in IN blog-dshr-org-7999 16 10 2013 2013 CD blog-dshr-org-7999 16 11 , , , blog-dshr-org-7999 16 12 notably notably RB blog-dshr-org-7999 16 13 that that DT blog-dshr-org-7999 16 14 : : : blog-dshr-org-7999 16 15 The the DT blog-dshr-org-7999 16 16 browser browser NN blog-dshr-org-7999 16 17 trusts trust VBZ blog-dshr-org-7999 16 18 all all DT blog-dshr-org-7999 16 19 of of IN blog-dshr-org-7999 16 20 them -PRON- PRP blog-dshr-org-7999 16 21 equally equally RB blog-dshr-org-7999 16 22 . . . blog-dshr-org-7999 17 1 The the DT blog-dshr-org-7999 17 2 browser browser NN blog-dshr-org-7999 17 3 trusts trust VBZ blog-dshr-org-7999 17 4 CAs ca VBN blog-dshr-org-7999 17 5 that that IN blog-dshr-org-7999 17 6 the the DT blog-dshr-org-7999 17 7 CAs ca NNS blog-dshr-org-7999 17 8 on on IN blog-dshr-org-7999 17 9 the the DT blog-dshr-org-7999 17 10 list list NN blog-dshr-org-7999 17 11 delegate delegate NN blog-dshr-org-7999 17 12 trust trust NN blog-dshr-org-7999 17 13 to to IN blog-dshr-org-7999 17 14 . . . blog-dshr-org-7999 18 1 Back back RB blog-dshr-org-7999 18 2 in in IN blog-dshr-org-7999 18 3 2010 2010 CD blog-dshr-org-7999 18 4 , , , blog-dshr-org-7999 18 5 the the DT blog-dshr-org-7999 18 6 EFF EFF NNP blog-dshr-org-7999 18 7 found find VBD blog-dshr-org-7999 18 8 more more JJR blog-dshr-org-7999 18 9 than than IN blog-dshr-org-7999 18 10 650 650 CD blog-dshr-org-7999 18 11 organizations organization NNS blog-dshr-org-7999 18 12 that that WDT blog-dshr-org-7999 18 13 Internet internet NN blog-dshr-org-7999 18 14 Explorer Explorer NNP blog-dshr-org-7999 18 15 and and CC blog-dshr-org-7999 18 16 Firefox Firefox NNP blog-dshr-org-7999 18 17 trusted trust VBD blog-dshr-org-7999 18 18 . . . blog-dshr-org-7999 19 1 Commercial commercial JJ blog-dshr-org-7999 19 2 CAs CAs NNP blog-dshr-org-7999 19 3 on on IN blog-dshr-org-7999 19 4 the the DT blog-dshr-org-7999 19 5 list list NN blog-dshr-org-7999 19 6 , , , blog-dshr-org-7999 19 7 and and CC blog-dshr-org-7999 19 8 CAs ca NNS blog-dshr-org-7999 19 9 they -PRON- PRP blog-dshr-org-7999 19 10 delegate delegate VBP blog-dshr-org-7999 19 11 to to TO blog-dshr-org-7999 19 12 , , , blog-dshr-org-7999 19 13 have have VBP blog-dshr-org-7999 19 14 regularly regularly RB blog-dshr-org-7999 19 15 been be VBN blog-dshr-org-7999 19 16 found find VBN blog-dshr-org-7999 19 17 to to TO blog-dshr-org-7999 19 18 be be VB blog-dshr-org-7999 19 19 issuing issue VBG blog-dshr-org-7999 19 20 false false JJ blog-dshr-org-7999 19 21 or or CC blog-dshr-org-7999 19 22 insecure insecure JJ blog-dshr-org-7999 19 23 certificates certificate NNS blog-dshr-org-7999 19 24 . . . blog-dshr-org-7999 20 1 Among among IN blog-dshr-org-7999 20 2 the the DT blog-dshr-org-7999 20 3 CAs ca NNS blog-dshr-org-7999 20 4 on on IN blog-dshr-org-7999 20 5 the the DT blog-dshr-org-7999 20 6 list list NN blog-dshr-org-7999 20 7 are be VBP blog-dshr-org-7999 20 8 agencies agency NNS blog-dshr-org-7999 20 9 of of IN blog-dshr-org-7999 20 10 many many JJ blog-dshr-org-7999 20 11 governments government NNS blog-dshr-org-7999 20 12 , , , blog-dshr-org-7999 20 13 such such JJ blog-dshr-org-7999 20 14 as as IN blog-dshr-org-7999 20 15 the the DT blog-dshr-org-7999 20 16 Dutch Dutch NNPS blog-dshr-org-7999 20 17 , , , blog-dshr-org-7999 20 18 Chinese Chinese NNPS blog-dshr-org-7999 20 19 , , , blog-dshr-org-7999 20 20 Hong Hong NNP blog-dshr-org-7999 20 21 Kong Kong NNP blog-dshr-org-7999 20 22 , , , blog-dshr-org-7999 20 23 and and CC blog-dshr-org-7999 20 24 Japanese japanese JJ blog-dshr-org-7999 20 25 governments government NNS blog-dshr-org-7999 20 26 . . . blog-dshr-org-7999 21 1 My -PRON- PRP$ blog-dshr-org-7999 21 2 current current JJ blog-dshr-org-7999 21 3 Firefox Firefox NNP blog-dshr-org-7999 21 4 browser browser NN blog-dshr-org-7999 21 5 trusts trust VBZ blog-dshr-org-7999 21 6 305 305 CD blog-dshr-org-7999 21 7 root root NN blog-dshr-org-7999 21 8 certificates certificate NNS blog-dshr-org-7999 21 9 from from IN blog-dshr-org-7999 21 10 79 79 CD blog-dshr-org-7999 21 11 unique unique JJ blog-dshr-org-7999 21 12 organizations organization NNS blog-dshr-org-7999 21 13 . . . blog-dshr-org-7999 22 1 One one CD blog-dshr-org-7999 22 2 of of IN blog-dshr-org-7999 22 3 these these DT blog-dshr-org-7999 22 4 organizations organization NNS blog-dshr-org-7999 22 5 is be VBZ blog-dshr-org-7999 22 6 the the DT blog-dshr-org-7999 22 7 Internet Internet NNP blog-dshr-org-7999 22 8 Security Security NNP blog-dshr-org-7999 22 9 Research Research NNP blog-dshr-org-7999 22 10 Group Group NNP blog-dshr-org-7999 22 11 , , , blog-dshr-org-7999 22 12 a a DT blog-dshr-org-7999 22 13 not not RB blog-dshr-org-7999 22 14 - - HYPH blog-dshr-org-7999 22 15 for for IN blog-dshr-org-7999 22 16 - - HYPH blog-dshr-org-7999 22 17 profit profit NN blog-dshr-org-7999 22 18 organization organization NN blog-dshr-org-7999 22 19 hosted host VBN blog-dshr-org-7999 22 20 by by IN blog-dshr-org-7999 22 21 the the DT blog-dshr-org-7999 22 22 Linux Linux NNP blog-dshr-org-7999 22 23 Foundation Foundation NNP blog-dshr-org-7999 22 24 and and CC blog-dshr-org-7999 22 25 sponsored sponsor VBN blog-dshr-org-7999 22 26 by by IN blog-dshr-org-7999 22 27 many many JJ blog-dshr-org-7999 22 28 organizations organization NNS blog-dshr-org-7999 22 29 including include VBG blog-dshr-org-7999 22 30 Mozilla Mozilla NNP blog-dshr-org-7999 22 31 and and CC blog-dshr-org-7999 22 32 the the DT blog-dshr-org-7999 22 33 EFF EFF NNP blog-dshr-org-7999 22 34 , , , blog-dshr-org-7999 22 35 which which WDT blog-dshr-org-7999 22 36 has have VBZ blog-dshr-org-7999 22 37 greatly greatly RB blog-dshr-org-7999 22 38 improved improve VBN blog-dshr-org-7999 22 39 the the DT blog-dshr-org-7999 22 40 information information NN blog-dshr-org-7999 22 41 hygiene hygiene NN blog-dshr-org-7999 22 42 of of IN blog-dshr-org-7999 22 43 the the DT blog-dshr-org-7999 22 44 Web web NN blog-dshr-org-7999 22 45 through through IN blog-dshr-org-7999 22 46 a a DT blog-dshr-org-7999 22 47 program program NN blog-dshr-org-7999 22 48 called call VBN blog-dshr-org-7999 22 49 Let let VB blog-dshr-org-7999 22 50 's -PRON- PRP blog-dshr-org-7999 22 51 Encrypt Encrypt NNP blog-dshr-org-7999 22 52 . . . blog-dshr-org-7999 23 1 This this DT blog-dshr-org-7999 23 2 has have VBZ blog-dshr-org-7999 23 3 provided provide VBN blog-dshr-org-7999 23 4 over over IN blog-dshr-org-7999 23 5 115 115 CD blog-dshr-org-7999 23 6 million million CD blog-dshr-org-7999 23 7 Web web NN blog-dshr-org-7999 23 8 sites site NNS blog-dshr-org-7999 23 9 with with IN blog-dshr-org-7999 23 10 free free JJ blog-dshr-org-7999 23 11 certificates certificate NNS blog-dshr-org-7999 23 12 carrying carry VBG blog-dshr-org-7999 23 13 a a DT blog-dshr-org-7999 23 14 signature signature NN blog-dshr-org-7999 23 15 chain chain NN blog-dshr-org-7999 23 16 rooted root VBN blog-dshr-org-7999 23 17 in in IN blog-dshr-org-7999 23 18 a a DT blog-dshr-org-7999 23 19 certificate certificate NN blog-dshr-org-7999 23 20 that that WDT blog-dshr-org-7999 23 21 almost almost RB blog-dshr-org-7999 23 22 all all DT blog-dshr-org-7999 23 23 browsers browser NNS blog-dshr-org-7999 23 24 trust trust NN blog-dshr-org-7999 23 25 . . . blog-dshr-org-7999 24 1 This this DT blog-dshr-org-7999 24 2 blog blog NN blog-dshr-org-7999 24 3 's 's POS blog-dshr-org-7999 24 4 certificate certificate NN blog-dshr-org-7999 24 5 is be VBZ blog-dshr-org-7999 24 6 one one CD blog-dshr-org-7999 24 7 of of IN blog-dshr-org-7999 24 8 them -PRON- PRP blog-dshr-org-7999 24 9 , , , blog-dshr-org-7999 24 10 as as IN blog-dshr-org-7999 24 11 you -PRON- PRP blog-dshr-org-7999 24 12 can can MD blog-dshr-org-7999 24 13 see see VB blog-dshr-org-7999 24 14 by by IN blog-dshr-org-7999 24 15 clicking click VBG blog-dshr-org-7999 24 16 on on IN blog-dshr-org-7999 24 17 the the DT blog-dshr-org-7999 24 18 padlock padlock NN blog-dshr-org-7999 24 19 icon icon NN blog-dshr-org-7999 24 20 . . . blog-dshr-org-7999 25 1 Some some DT blog-dshr-org-7999 25 2 of of IN blog-dshr-org-7999 25 3 the the DT blog-dshr-org-7999 25 4 organizations organization NNS blog-dshr-org-7999 25 5 whose whose WP$ blog-dshr-org-7999 25 6 root root NN blog-dshr-org-7999 25 7 certificates certificate VBZ blog-dshr-org-7999 25 8 my -PRON- PRP$ blog-dshr-org-7999 25 9 browser browser NN blog-dshr-org-7999 25 10 trusts trust NNS blog-dshr-org-7999 25 11 are be VBP blog-dshr-org-7999 25 12 known know VBN blog-dshr-org-7999 25 13 to to TO blog-dshr-org-7999 25 14 have have VB blog-dshr-org-7999 25 15 abused abuse VBN blog-dshr-org-7999 25 16 this this DT blog-dshr-org-7999 25 17 trust trust NN blog-dshr-org-7999 25 18 . . . blog-dshr-org-7999 26 1 For for IN blog-dshr-org-7999 26 2 example example NN blog-dshr-org-7999 26 3 , , , blog-dshr-org-7999 26 4 Dan Dan NNP blog-dshr-org-7999 26 5 Goodin Goodin NNP blog-dshr-org-7999 26 6 writes write VBZ blog-dshr-org-7999 26 7 in in IN blog-dshr-org-7999 26 8 One one CD blog-dshr-org-7999 26 9 - - HYPH blog-dshr-org-7999 26 10 stop stop NN blog-dshr-org-7999 26 11 counterfeit counterfeit JJ blog-dshr-org-7999 26 12 certificate certificate NN blog-dshr-org-7999 26 13 shops shop NNS blog-dshr-org-7999 26 14 for for IN blog-dshr-org-7999 26 15 all all PDT blog-dshr-org-7999 26 16 your -PRON- PRP$ blog-dshr-org-7999 26 17 malware malware NN blog-dshr-org-7999 26 18 - - HYPH blog-dshr-org-7999 26 19 signing signing NN blog-dshr-org-7999 26 20 needs need NNS blog-dshr-org-7999 26 21 : : : blog-dshr-org-7999 26 22 Barysevich Barysevich NNP blog-dshr-org-7999 26 23 identified identify VBD blog-dshr-org-7999 26 24 four four CD blog-dshr-org-7999 26 25 such such JJ blog-dshr-org-7999 26 26 sellers seller NNS blog-dshr-org-7999 26 27 of of IN blog-dshr-org-7999 26 28 counterfeit counterfeit JJ blog-dshr-org-7999 26 29 certificates certificate NNS blog-dshr-org-7999 26 30 since since IN blog-dshr-org-7999 26 31 2011 2011 CD blog-dshr-org-7999 26 32 . . . blog-dshr-org-7999 27 1 Two two CD blog-dshr-org-7999 27 2 of of IN blog-dshr-org-7999 27 3 them -PRON- PRP blog-dshr-org-7999 27 4 remain remain VBP blog-dshr-org-7999 27 5 in in IN blog-dshr-org-7999 27 6 business business NN blog-dshr-org-7999 27 7 today today NN blog-dshr-org-7999 27 8 . . . blog-dshr-org-7999 28 1 The the DT blog-dshr-org-7999 28 2 sellers seller NNS blog-dshr-org-7999 28 3 offered offer VBD blog-dshr-org-7999 28 4 a a DT blog-dshr-org-7999 28 5 variety variety NN blog-dshr-org-7999 28 6 of of IN blog-dshr-org-7999 28 7 options option NNS blog-dshr-org-7999 28 8 . . . blog-dshr-org-7999 29 1 In in IN blog-dshr-org-7999 29 2 2014 2014 CD blog-dshr-org-7999 29 3 , , , blog-dshr-org-7999 29 4 one one CD blog-dshr-org-7999 29 5 provider provider NN blog-dshr-org-7999 29 6 calling call VBG blog-dshr-org-7999 29 7 himself -PRON- PRP blog-dshr-org-7999 29 8 C@T C@T NNP blog-dshr-org-7999 29 9 advertised advertise VBD blog-dshr-org-7999 29 10 certificates certificate NNS blog-dshr-org-7999 29 11 that that WDT blog-dshr-org-7999 29 12 used use VBD blog-dshr-org-7999 29 13 a a DT blog-dshr-org-7999 29 14 Microsoft Microsoft NNP blog-dshr-org-7999 29 15 technology technology NN blog-dshr-org-7999 29 16 known know VBN blog-dshr-org-7999 29 17 as as IN blog-dshr-org-7999 29 18 Authenticode Authenticode NNP blog-dshr-org-7999 29 19 for for IN blog-dshr-org-7999 29 20 signing sign VBG blog-dshr-org-7999 29 21 executable executable JJ blog-dshr-org-7999 29 22 files file NNS blog-dshr-org-7999 29 23 and and CC blog-dshr-org-7999 29 24 programming programming NN blog-dshr-org-7999 29 25 scripts script NNS blog-dshr-org-7999 29 26 that that WDT blog-dshr-org-7999 29 27 can can MD blog-dshr-org-7999 29 28 install install VB blog-dshr-org-7999 29 29 software software NN blog-dshr-org-7999 29 30 . . . blog-dshr-org-7999 30 1 C@T C@T NNP blog-dshr-org-7999 30 2 offered offer VBD blog-dshr-org-7999 30 3 code code NN blog-dshr-org-7999 30 4 - - HYPH blog-dshr-org-7999 30 5 signing signing NN blog-dshr-org-7999 30 6 certificates certificate NNS blog-dshr-org-7999 30 7 for for IN blog-dshr-org-7999 30 8 macOS macos NN blog-dshr-org-7999 30 9 apps app NNS blog-dshr-org-7999 30 10 as as RB blog-dshr-org-7999 30 11 well well RB blog-dshr-org-7999 30 12 . . . blog-dshr-org-7999 31 1 ... ... : blog-dshr-org-7999 31 2 " " `` blog-dshr-org-7999 31 3 In in IN blog-dshr-org-7999 31 4 his -PRON- PRP$ blog-dshr-org-7999 31 5 advertisement advertisement NN blog-dshr-org-7999 31 6 , , , blog-dshr-org-7999 31 7 C@T C@T NNP blog-dshr-org-7999 31 8 explained explain VBD blog-dshr-org-7999 31 9 that that IN blog-dshr-org-7999 31 10 the the DT blog-dshr-org-7999 31 11 certificates certificate NNS blog-dshr-org-7999 31 12 are be VBP blog-dshr-org-7999 31 13 registered register VBN blog-dshr-org-7999 31 14 under under IN blog-dshr-org-7999 31 15 legitimate legitimate JJ blog-dshr-org-7999 31 16 corporations corporation NNS blog-dshr-org-7999 31 17 and and CC blog-dshr-org-7999 31 18 issued issue VBN blog-dshr-org-7999 31 19 by by IN blog-dshr-org-7999 31 20 Comodo Comodo NNP blog-dshr-org-7999 31 21 , , , blog-dshr-org-7999 31 22 Thawte Thawte NNP blog-dshr-org-7999 31 23 , , , blog-dshr-org-7999 31 24 and and CC blog-dshr-org-7999 31 25 Symantec Symantec NNP blog-dshr-org-7999 31 26 — — : blog-dshr-org-7999 31 27 the the DT blog-dshr-org-7999 31 28 largest large JJS blog-dshr-org-7999 31 29 and and CC blog-dshr-org-7999 31 30 most most RBS blog-dshr-org-7999 31 31 respected respected JJ blog-dshr-org-7999 31 32 issuers issuer NNS blog-dshr-org-7999 31 33 , , , blog-dshr-org-7999 31 34 " " `` blog-dshr-org-7999 31 35 Abuse abuse NN blog-dshr-org-7999 31 36 of of IN blog-dshr-org-7999 31 37 the the DT blog-dshr-org-7999 31 38 trust trust NN blog-dshr-org-7999 31 39 users user NNS blog-dshr-org-7999 31 40 place place NN blog-dshr-org-7999 31 41 in in IN blog-dshr-org-7999 31 42 CAs CAs NNP blog-dshr-org-7999 31 43 is be VBZ blog-dshr-org-7999 31 44 routine routine JJ blog-dshr-org-7999 31 45 : : : blog-dshr-org-7999 31 46 Over over IN blog-dshr-org-7999 31 47 the the DT blog-dshr-org-7999 31 48 past past JJ blog-dshr-org-7999 31 49 few few JJ blog-dshr-org-7999 31 50 years year NNS blog-dshr-org-7999 31 51 there there EX blog-dshr-org-7999 31 52 have have VBP blog-dshr-org-7999 31 53 been be VBN blog-dshr-org-7999 31 54 numerous numerous JJ blog-dshr-org-7999 31 55 instances instance NNS blog-dshr-org-7999 31 56 of of IN blog-dshr-org-7999 31 57 misissued misissued JJ blog-dshr-org-7999 31 58 certificates certificate NNS blog-dshr-org-7999 31 59 being be VBG blog-dshr-org-7999 31 60 used use VBN blog-dshr-org-7999 31 61 to to TO blog-dshr-org-7999 31 62 spoof spoof VB blog-dshr-org-7999 31 63 legitimate legitimate JJ blog-dshr-org-7999 31 64 sites site NNS blog-dshr-org-7999 31 65 , , , blog-dshr-org-7999 31 66 and and CC blog-dshr-org-7999 31 67 , , , blog-dshr-org-7999 31 68 in in IN blog-dshr-org-7999 31 69 some some DT blog-dshr-org-7999 31 70 case case NN blog-dshr-org-7999 31 71 , , , blog-dshr-org-7999 31 72 install install VB blog-dshr-org-7999 31 73 malicious malicious JJ blog-dshr-org-7999 31 74 software software NN blog-dshr-org-7999 31 75 or or CC blog-dshr-org-7999 31 76 spy spy NN blog-dshr-org-7999 31 77 on on IN blog-dshr-org-7999 31 78 unsuspecting unsuspecting JJ blog-dshr-org-7999 31 79 users user NNS blog-dshr-org-7999 31 80 . . . blog-dshr-org-7999 32 1 In in IN blog-dshr-org-7999 32 2 one one CD blog-dshr-org-7999 32 3 case case NN blog-dshr-org-7999 32 4 , , , blog-dshr-org-7999 32 5 a a DT blog-dshr-org-7999 32 6 prominent prominent JJ blog-dshr-org-7999 32 7 Dutch Dutch NNP blog-dshr-org-7999 32 8 CA CA NNP blog-dshr-org-7999 32 9 ( ( -LRB- blog-dshr-org-7999 32 10 DigiNotar DigiNotar NNP blog-dshr-org-7999 32 11 ) ) -RRB- blog-dshr-org-7999 32 12 was be VBD blog-dshr-org-7999 32 13 compromised compromise VBN blog-dshr-org-7999 32 14 and and CC blog-dshr-org-7999 32 15 the the DT blog-dshr-org-7999 32 16 hackers hacker NNS blog-dshr-org-7999 32 17 were be VBD blog-dshr-org-7999 32 18 able able JJ blog-dshr-org-7999 32 19 to to TO blog-dshr-org-7999 32 20 use use VB blog-dshr-org-7999 32 21 the the DT blog-dshr-org-7999 32 22 CA CA NNP blog-dshr-org-7999 32 23 ’s ’s POS blog-dshr-org-7999 32 24 system system NN blog-dshr-org-7999 32 25 to to TO blog-dshr-org-7999 32 26 issue issue VB blog-dshr-org-7999 32 27 fake fake JJ blog-dshr-org-7999 32 28 SSL SSL NNP blog-dshr-org-7999 32 29 certificates certificate NNS blog-dshr-org-7999 32 30 . . . blog-dshr-org-7999 33 1 The the DT blog-dshr-org-7999 33 2 certificates certificate NNS blog-dshr-org-7999 33 3 were be VBD blog-dshr-org-7999 33 4 used use VBN blog-dshr-org-7999 33 5 to to TO blog-dshr-org-7999 33 6 impersonate impersonate VB blog-dshr-org-7999 33 7 numerous numerous JJ blog-dshr-org-7999 33 8 sites site NNS blog-dshr-org-7999 33 9 in in IN blog-dshr-org-7999 33 10 Iran Iran NNP blog-dshr-org-7999 33 11 , , , blog-dshr-org-7999 33 12 such such JJ blog-dshr-org-7999 33 13 as as IN blog-dshr-org-7999 33 14 Gmail Gmail NNP blog-dshr-org-7999 33 15 and and CC blog-dshr-org-7999 33 16 Facebook Facebook NNP blog-dshr-org-7999 33 17 , , , blog-dshr-org-7999 33 18 which which WDT blog-dshr-org-7999 33 19 enabled enable VBD blog-dshr-org-7999 33 20 the the DT blog-dshr-org-7999 33 21 operators operator NNS blog-dshr-org-7999 33 22 of of IN blog-dshr-org-7999 33 23 the the DT blog-dshr-org-7999 33 24 fake fake JJ blog-dshr-org-7999 33 25 sites site NNS blog-dshr-org-7999 33 26 to to TO blog-dshr-org-7999 33 27 spy spy VB blog-dshr-org-7999 33 28 on on IN blog-dshr-org-7999 33 29 unsuspecting unsuspecting JJ blog-dshr-org-7999 33 30 site site NN blog-dshr-org-7999 33 31 users user NNS blog-dshr-org-7999 33 32 . . . blog-dshr-org-7999 34 1 In in IN blog-dshr-org-7999 34 2 another another DT blog-dshr-org-7999 34 3 case case NN blog-dshr-org-7999 34 4 , , , blog-dshr-org-7999 34 5 a a DT blog-dshr-org-7999 34 6 Malaysian malaysian JJ blog-dshr-org-7999 34 7 subordinate subordinate JJ blog-dshr-org-7999 34 8 certificate certificate NN blog-dshr-org-7999 34 9 authority authority NN blog-dshr-org-7999 34 10 ( ( -LRB- blog-dshr-org-7999 34 11 DigiCert DigiCert NNP blog-dshr-org-7999 34 12 Sdn Sdn NNP blog-dshr-org-7999 34 13 . . . blog-dshr-org-7999 35 1 Bhd Bhd NNP blog-dshr-org-7999 35 2 . . . blog-dshr-org-7999 36 1 ) ) -RRB- blog-dshr-org-7999 36 2 , , , blog-dshr-org-7999 36 3 mistakenly mistakenly RB blog-dshr-org-7999 36 4 issued issue VBD blog-dshr-org-7999 36 5 22 22 CD blog-dshr-org-7999 36 6 weak weak JJ blog-dshr-org-7999 36 7 SSL SSL NNP blog-dshr-org-7999 36 8 certificates certificate NNS blog-dshr-org-7999 36 9 , , , blog-dshr-org-7999 36 10 which which WDT blog-dshr-org-7999 36 11 could could MD blog-dshr-org-7999 36 12 be be VB blog-dshr-org-7999 36 13 used use VBN blog-dshr-org-7999 36 14 to to TO blog-dshr-org-7999 36 15 impersonate impersonate VB blog-dshr-org-7999 36 16 websites website NNS blog-dshr-org-7999 36 17 and and CC blog-dshr-org-7999 36 18 sign sign VB blog-dshr-org-7999 36 19 malicious malicious JJ blog-dshr-org-7999 36 20 software software NN blog-dshr-org-7999 36 21 . . . blog-dshr-org-7999 37 1 As as IN blog-dshr-org-7999 37 2 a a DT blog-dshr-org-7999 37 3 result result NN blog-dshr-org-7999 37 4 , , , blog-dshr-org-7999 37 5 major major JJ blog-dshr-org-7999 37 6 browsers browser NNS blog-dshr-org-7999 37 7 had have VBD blog-dshr-org-7999 37 8 to to TO blog-dshr-org-7999 37 9 revoke revoke VB blog-dshr-org-7999 37 10 their -PRON- PRP$ blog-dshr-org-7999 37 11 trust trust NN blog-dshr-org-7999 37 12 in in IN blog-dshr-org-7999 37 13 all all DT blog-dshr-org-7999 37 14 certificates certificate NNS blog-dshr-org-7999 37 15 issued issue VBN blog-dshr-org-7999 37 16 by by IN blog-dshr-org-7999 37 17 DigiCert DigiCert NNP blog-dshr-org-7999 37 18 Sdn Sdn NNP blog-dshr-org-7999 37 19 . . . blog-dshr-org-7999 38 1 Bhd Bhd NNP blog-dshr-org-7999 38 2 . . . blog-dshr-org-7999 39 1 ( ( -LRB- blog-dshr-org-7999 39 2 Note note NN blog-dshr-org-7999 39 3 : : : blog-dshr-org-7999 39 4 DigiCert DigiCert NNP blog-dshr-org-7999 39 5 Sdn Sdn NNP blog-dshr-org-7999 39 6 . . . blog-dshr-org-7999 40 1 Bhd Bhd NNP blog-dshr-org-7999 40 2 . . . blog-dshr-org-7999 41 1 is be VBZ blog-dshr-org-7999 41 2 not not RB blog-dshr-org-7999 41 3 affiliated affiliate VBN blog-dshr-org-7999 41 4 with with IN blog-dshr-org-7999 41 5 the the DT blog-dshr-org-7999 41 6 U.S.-based u.s.-based JJ blog-dshr-org-7999 41 7 corporation corporation NN blog-dshr-org-7999 41 8 DigiCert DigiCert NNP blog-dshr-org-7999 41 9 , , , blog-dshr-org-7999 41 10 Inc. Inc. NNP blog-dshr-org-7999 41 11 ) ) -RRB- blog-dshr-org-7999 41 12 More more RBR blog-dshr-org-7999 41 13 recently recently RB blog-dshr-org-7999 41 14 , , , blog-dshr-org-7999 41 15 a a DT blog-dshr-org-7999 41 16 large large JJ blog-dshr-org-7999 41 17 U.S.-based u.s.-based JJ blog-dshr-org-7999 41 18 CA CA NNP blog-dshr-org-7999 41 19 ( ( -LRB- blog-dshr-org-7999 41 20 TrustWave TrustWave NNP blog-dshr-org-7999 41 21 ) ) -RRB- blog-dshr-org-7999 41 22 admitted admit VBD blog-dshr-org-7999 41 23 that that IN blog-dshr-org-7999 41 24 it -PRON- PRP blog-dshr-org-7999 41 25 issued issue VBD blog-dshr-org-7999 41 26 subordinate subordinate JJ blog-dshr-org-7999 41 27 root root NN blog-dshr-org-7999 41 28 certificates certificate NNS blog-dshr-org-7999 41 29 to to IN blog-dshr-org-7999 41 30 one one CD blog-dshr-org-7999 41 31 of of IN blog-dshr-org-7999 41 32 its -PRON- PRP$ blog-dshr-org-7999 41 33 customers customer NNS blog-dshr-org-7999 41 34 so so IN blog-dshr-org-7999 41 35 the the DT blog-dshr-org-7999 41 36 customer customer NN blog-dshr-org-7999 41 37 could could MD blog-dshr-org-7999 41 38 monitor monitor VB blog-dshr-org-7999 41 39 traffic traffic NN blog-dshr-org-7999 41 40 on on IN blog-dshr-org-7999 41 41 their -PRON- PRP$ blog-dshr-org-7999 41 42 internal internal JJ blog-dshr-org-7999 41 43 network network NN blog-dshr-org-7999 41 44 . . . blog-dshr-org-7999 42 1 Subordinate subordinate JJ blog-dshr-org-7999 42 2 root root NN blog-dshr-org-7999 42 3 certificates certificate NNS blog-dshr-org-7999 42 4 can can MD blog-dshr-org-7999 42 5 be be VB blog-dshr-org-7999 42 6 used use VBN blog-dshr-org-7999 42 7 to to TO blog-dshr-org-7999 42 8 create create VB blog-dshr-org-7999 42 9 SSL SSL NNP blog-dshr-org-7999 42 10 certificates certificate NNS blog-dshr-org-7999 42 11 for for IN blog-dshr-org-7999 42 12 nearly nearly RB blog-dshr-org-7999 42 13 any any DT blog-dshr-org-7999 42 14 domain domain NN blog-dshr-org-7999 42 15 on on IN blog-dshr-org-7999 42 16 the the DT blog-dshr-org-7999 42 17 Internet internet NN blog-dshr-org-7999 42 18 . . . blog-dshr-org-7999 43 1 Although although IN blog-dshr-org-7999 43 2 Trustwave Trustwave NNP blog-dshr-org-7999 43 3 has have VBZ blog-dshr-org-7999 43 4 revoked revoke VBN blog-dshr-org-7999 43 5 the the DT blog-dshr-org-7999 43 6 certificate certificate NN blog-dshr-org-7999 43 7 and and CC blog-dshr-org-7999 43 8 stated state VBD blog-dshr-org-7999 43 9 that that IN blog-dshr-org-7999 43 10 it -PRON- PRP blog-dshr-org-7999 43 11 will will MD blog-dshr-org-7999 43 12 no no RB blog-dshr-org-7999 43 13 longer long RBR blog-dshr-org-7999 43 14 issue issue VB blog-dshr-org-7999 43 15 subordinate subordinate JJ blog-dshr-org-7999 43 16 root root NN blog-dshr-org-7999 43 17 certificates certificate NNS blog-dshr-org-7999 43 18 to to IN blog-dshr-org-7999 43 19 customers customer NNS blog-dshr-org-7999 43 20 , , , blog-dshr-org-7999 43 21 it -PRON- PRP blog-dshr-org-7999 43 22 illustrates illustrate VBZ blog-dshr-org-7999 43 23 just just RB blog-dshr-org-7999 43 24 how how WRB blog-dshr-org-7999 43 25 easy easy JJ blog-dshr-org-7999 43 26 it -PRON- PRP blog-dshr-org-7999 43 27 is be VBZ blog-dshr-org-7999 43 28 for for IN blog-dshr-org-7999 43 29 CAs ca NNS blog-dshr-org-7999 43 30 to to TO blog-dshr-org-7999 43 31 make make VB blog-dshr-org-7999 43 32 missteps misstep NNS blog-dshr-org-7999 43 33 and and CC blog-dshr-org-7999 43 34 just just RB blog-dshr-org-7999 43 35 how how WRB blog-dshr-org-7999 43 36 severe severe JJ blog-dshr-org-7999 43 37 the the DT blog-dshr-org-7999 43 38 consequences consequence NNS blog-dshr-org-7999 43 39 of of IN blog-dshr-org-7999 43 40 those those DT blog-dshr-org-7999 43 41 missteps misstep NNS blog-dshr-org-7999 43 42 might may MD blog-dshr-org-7999 43 43 be be VB blog-dshr-org-7999 43 44 . . . blog-dshr-org-7999 44 1 Just just RB blog-dshr-org-7999 44 2 yesterday yesterday NN blog-dshr-org-7999 44 3 , , , blog-dshr-org-7999 44 4 there there EX blog-dshr-org-7999 44 5 was be VBD blog-dshr-org-7999 44 6 another another DT blog-dshr-org-7999 44 7 example example NN blog-dshr-org-7999 44 8 : : : blog-dshr-org-7999 44 9 The the DT blog-dshr-org-7999 44 10 issue issue NN blog-dshr-org-7999 44 11 with with IN blog-dshr-org-7999 44 12 the the DT blog-dshr-org-7999 44 13 two two CD blog-dshr-org-7999 44 14 HeadSetup HeadSetup NNP blog-dshr-org-7999 44 15 apps app NNS blog-dshr-org-7999 44 16 came come VBD blog-dshr-org-7999 44 17 to to IN blog-dshr-org-7999 44 18 light light NN blog-dshr-org-7999 44 19 earlier early RBR blog-dshr-org-7999 44 20 this this DT blog-dshr-org-7999 44 21 year year NN blog-dshr-org-7999 44 22 when when WRB blog-dshr-org-7999 44 23 German german JJ blog-dshr-org-7999 44 24 cyber cyber NN blog-dshr-org-7999 44 25 - - HYPH blog-dshr-org-7999 44 26 security security NN blog-dshr-org-7999 44 27 firm firm NN blog-dshr-org-7999 44 28 Secorvo Secorvo NNPS blog-dshr-org-7999 44 29 found find VBD blog-dshr-org-7999 44 30 that that IN blog-dshr-org-7999 44 31 versions version NNS blog-dshr-org-7999 44 32 7.3 7.3 CD blog-dshr-org-7999 44 33 , , , blog-dshr-org-7999 44 34 7.4 7.4 CD blog-dshr-org-7999 44 35 , , , blog-dshr-org-7999 44 36 and and CC blog-dshr-org-7999 44 37 8.0 8.0 CD blog-dshr-org-7999 44 38 installed instal VBN blog-dshr-org-7999 44 39 two two CD blog-dshr-org-7999 44 40 root root NN blog-dshr-org-7999 44 41 Certification Certification NNP blog-dshr-org-7999 44 42 Authority Authority NNP blog-dshr-org-7999 44 43 ( ( -LRB- blog-dshr-org-7999 44 44 CA CA NNP blog-dshr-org-7999 44 45 ) ) -RRB- blog-dshr-org-7999 44 46 certificates certificate VBZ blog-dshr-org-7999 44 47 into into IN blog-dshr-org-7999 44 48 the the DT blog-dshr-org-7999 44 49 Windows Windows NNP blog-dshr-org-7999 44 50 Trusted Trusted NNP blog-dshr-org-7999 44 51 Root Root NNP blog-dshr-org-7999 44 52 Certificate Certificate NNP blog-dshr-org-7999 44 53 Store Store NNP blog-dshr-org-7999 44 54 of of IN blog-dshr-org-7999 44 55 users user NNS blog-dshr-org-7999 44 56 ' ' POS blog-dshr-org-7999 44 57 computers computer NNS blog-dshr-org-7999 44 58 but but CC blog-dshr-org-7999 44 59 also also RB blog-dshr-org-7999 44 60 included include VBD blog-dshr-org-7999 44 61 the the DT blog-dshr-org-7999 44 62 private private JJ blog-dshr-org-7999 44 63 keys key NNS blog-dshr-org-7999 44 64 for for IN blog-dshr-org-7999 44 65 all all DT blog-dshr-org-7999 44 66 in in IN blog-dshr-org-7999 44 67 the the DT blog-dshr-org-7999 44 68 SennComCCKey.pem SennComCCKey.pem NNP blog-dshr-org-7999 44 69 file file NN blog-dshr-org-7999 44 70 . . . blog-dshr-org-7999 45 1 In in IN blog-dshr-org-7999 45 2 a a DT blog-dshr-org-7999 45 3 report report NN blog-dshr-org-7999 45 4 published publish VBN blog-dshr-org-7999 45 5 today today NN blog-dshr-org-7999 45 6 , , , blog-dshr-org-7999 45 7 Secorvo Secorvo NNPS blog-dshr-org-7999 45 8 researchers researcher NNS blog-dshr-org-7999 45 9 published publish VBD blog-dshr-org-7999 45 10 proof proof NN blog-dshr-org-7999 45 11 - - HYPH blog-dshr-org-7999 45 12 of of IN blog-dshr-org-7999 45 13 - - HYPH blog-dshr-org-7999 45 14 concept concept NN blog-dshr-org-7999 45 15 code code NN blog-dshr-org-7999 45 16 showing show VBG blog-dshr-org-7999 45 17 how how WRB blog-dshr-org-7999 45 18 trivial trivial JJ blog-dshr-org-7999 45 19 would would MD blog-dshr-org-7999 45 20 be be VB blog-dshr-org-7999 45 21 for for IN blog-dshr-org-7999 45 22 an an DT blog-dshr-org-7999 45 23 attacker attacker NN blog-dshr-org-7999 45 24 to to TO blog-dshr-org-7999 45 25 analyze analyze VB blog-dshr-org-7999 45 26 the the DT blog-dshr-org-7999 45 27 installers installer NNS blog-dshr-org-7999 45 28 for for IN blog-dshr-org-7999 45 29 both both DT blog-dshr-org-7999 45 30 apps app NNS blog-dshr-org-7999 45 31 and and CC blog-dshr-org-7999 45 32 extract extract VB blog-dshr-org-7999 45 33 the the DT blog-dshr-org-7999 45 34 private private JJ blog-dshr-org-7999 45 35 keys key NNS blog-dshr-org-7999 45 36 . . . blog-dshr-org-7999 46 1 Making make VBG blog-dshr-org-7999 46 2 matters matter NNS blog-dshr-org-7999 46 3 worse worse RBR blog-dshr-org-7999 46 4 , , , blog-dshr-org-7999 46 5 the the DT blog-dshr-org-7999 46 6 certificates certificate NNS blog-dshr-org-7999 46 7 are be VBP blog-dshr-org-7999 46 8 also also RB blog-dshr-org-7999 46 9 installed instal VBN blog-dshr-org-7999 46 10 for for IN blog-dshr-org-7999 46 11 Mac Mac NNP blog-dshr-org-7999 46 12 users user NNS blog-dshr-org-7999 46 13 , , , blog-dshr-org-7999 46 14 via via IN blog-dshr-org-7999 46 15 HeadSetup HeadSetup NNP blog-dshr-org-7999 46 16 macOS macOS NNP blog-dshr-org-7999 46 17 app app NN blog-dshr-org-7999 46 18 versions version NNS blog-dshr-org-7999 46 19 , , , blog-dshr-org-7999 46 20 and and CC blog-dshr-org-7999 46 21 they -PRON- PRP blog-dshr-org-7999 46 22 are be VBP blog-dshr-org-7999 46 23 n't not RB blog-dshr-org-7999 46 24 removed remove VBN blog-dshr-org-7999 46 25 from from IN blog-dshr-org-7999 46 26 the the DT blog-dshr-org-7999 46 27 operating operating NN blog-dshr-org-7999 46 28 system system NN blog-dshr-org-7999 46 29 's 's POS blog-dshr-org-7999 46 30 Trusted Trusted NNP blog-dshr-org-7999 46 31 Root Root NNP blog-dshr-org-7999 46 32 Certificate Certificate NNP blog-dshr-org-7999 46 33 Store Store NNP blog-dshr-org-7999 46 34 during during IN blog-dshr-org-7999 46 35 current current JJ blog-dshr-org-7999 46 36 HeadSetup HeadSetup NNP blog-dshr-org-7999 46 37 updates update NNS blog-dshr-org-7999 46 38 or or CC blog-dshr-org-7999 46 39 uninstall uninstall JJ blog-dshr-org-7999 46 40 operations operation NNS blog-dshr-org-7999 46 41 . . . blog-dshr-org-7999 47 1 ... ... : blog-dshr-org-7999 47 2 Sennheiser Sennheiser NNP blog-dshr-org-7999 47 3 's 's POS blog-dshr-org-7999 47 4 snafu snafu NN blog-dshr-org-7999 47 5 , , , blog-dshr-org-7999 47 6 tracked track VBD blog-dshr-org-7999 47 7 as as IN blog-dshr-org-7999 47 8 CVE-2018 CVE-2018 NNP blog-dshr-org-7999 47 9 - - HYPH blog-dshr-org-7999 47 10 17612 17612 CD blog-dshr-org-7999 47 11 , , , blog-dshr-org-7999 47 12 is be VBZ blog-dshr-org-7999 47 13 not not RB blog-dshr-org-7999 47 14 the the DT blog-dshr-org-7999 47 15 first first JJ blog-dshr-org-7999 47 16 of of IN blog-dshr-org-7999 47 17 its -PRON- PRP$ blog-dshr-org-7999 47 18 kind kind NN blog-dshr-org-7999 47 19 . . . blog-dshr-org-7999 48 1 In in IN blog-dshr-org-7999 48 2 2015 2015 CD blog-dshr-org-7999 48 3 , , , blog-dshr-org-7999 48 4 Lenovo Lenovo NNP blog-dshr-org-7999 48 5 shipped ship VBD blog-dshr-org-7999 48 6 laptops laptop NNS blog-dshr-org-7999 48 7 with with IN blog-dshr-org-7999 48 8 a a DT blog-dshr-org-7999 48 9 certificate certificate NN blog-dshr-org-7999 48 10 that that WDT blog-dshr-org-7999 48 11 exposed expose VBD blog-dshr-org-7999 48 12 its -PRON- PRP$ blog-dshr-org-7999 48 13 private private JJ blog-dshr-org-7999 48 14 key key NN blog-dshr-org-7999 48 15 in in IN blog-dshr-org-7999 48 16 a a DT blog-dshr-org-7999 48 17 scandal scandal NN blog-dshr-org-7999 48 18 that that WDT blog-dshr-org-7999 48 19 became become VBD blog-dshr-org-7999 48 20 known know VBN blog-dshr-org-7999 48 21 as as IN blog-dshr-org-7999 48 22 Superfish Superfish NNP blog-dshr-org-7999 48 23 . . . blog-dshr-org-7999 49 1 Dell Dell NNP blog-dshr-org-7999 49 2 did do VBD blog-dshr-org-7999 49 3 the the DT blog-dshr-org-7999 49 4 exact exact JJ blog-dshr-org-7999 49 5 same same JJ blog-dshr-org-7999 49 6 thing thing NN blog-dshr-org-7999 49 7 in in IN blog-dshr-org-7999 49 8 2016 2016 CD blog-dshr-org-7999 49 9 in in IN blog-dshr-org-7999 49 10 a a DT blog-dshr-org-7999 49 11 similarly similarly RB blog-dshr-org-7999 49 12 bad bad JJ blog-dshr-org-7999 49 13 security security NN blog-dshr-org-7999 49 14 incident incident NN blog-dshr-org-7999 49 15 that that WDT blog-dshr-org-7999 49 16 became become VBD blog-dshr-org-7999 49 17 known know VBN blog-dshr-org-7999 49 18 as as IN blog-dshr-org-7999 49 19 eDellRoot edellroot ADD blog-dshr-org-7999 49 20 . . . blog-dshr-org-7999 50 1 This this DT blog-dshr-org-7999 50 2 type type NN blog-dshr-org-7999 50 3 of of IN blog-dshr-org-7999 50 4 “ " `` blog-dshr-org-7999 50 5 mistake mistake NN blog-dshr-org-7999 50 6 ” " '' blog-dshr-org-7999 50 7 allows allow VBZ blog-dshr-org-7999 50 8 attackers attacker NNS blog-dshr-org-7999 50 9 to to TO blog-dshr-org-7999 50 10 impersonate impersonate VB blog-dshr-org-7999 50 11 any any DT blog-dshr-org-7999 50 12 Web web NN blog-dshr-org-7999 50 13 site site NN blog-dshr-org-7999 50 14 to to IN blog-dshr-org-7999 50 15 affected affect VBN blog-dshr-org-7999 50 16 devices device NNS blog-dshr-org-7999 50 17 . . . blog-dshr-org-7999 51 1 CAs CAs NNP blog-dshr-org-7999 51 2 are be VBP blog-dshr-org-7999 51 3 supposed suppose VBN blog-dshr-org-7999 51 4 to to TO blog-dshr-org-7999 51 5 issue issue VB blog-dshr-org-7999 51 6 three three CD blog-dshr-org-7999 51 7 grades grade NNS blog-dshr-org-7999 51 8 of of IN blog-dshr-org-7999 51 9 certificate certificate NN blog-dshr-org-7999 51 10 based base VBN blog-dshr-org-7999 51 11 on on IN blog-dshr-org-7999 51 12 increasingly increasingly RB blog-dshr-org-7999 51 13 rigorous rigorous JJ blog-dshr-org-7999 51 14 validation validation NN blog-dshr-org-7999 51 15 : : : blog-dshr-org-7999 51 16 Domain Domain NNP blog-dshr-org-7999 51 17 Validated Validated NNP blog-dshr-org-7999 51 18 ( ( -LRB- blog-dshr-org-7999 51 19 DV DV NNP blog-dshr-org-7999 51 20 ) ) -RRB- blog-dshr-org-7999 51 21 certificates certificate VBZ blog-dshr-org-7999 51 22 verify verify VBP blog-dshr-org-7999 51 23 control control NN blog-dshr-org-7999 51 24 over over IN blog-dshr-org-7999 51 25 the the DT blog-dshr-org-7999 51 26 DNS dns NN blog-dshr-org-7999 51 27 entries entry NNS blog-dshr-org-7999 51 28 , , , blog-dshr-org-7999 51 29 email email NN blog-dshr-org-7999 51 30 and and CC blog-dshr-org-7999 51 31 Web web NN blog-dshr-org-7999 51 32 content content NN blog-dshr-org-7999 51 33 of of IN blog-dshr-org-7999 51 34 the the DT blog-dshr-org-7999 51 35 specified specified JJ blog-dshr-org-7999 51 36 domain domain NN blog-dshr-org-7999 51 37 . . . blog-dshr-org-7999 52 1 They -PRON- PRP blog-dshr-org-7999 52 2 can can MD blog-dshr-org-7999 52 3 be be VB blog-dshr-org-7999 52 4 issued issue VBN blog-dshr-org-7999 52 5 via via IN blog-dshr-org-7999 52 6 automated automate VBN blog-dshr-org-7999 52 7 processes process NNS blog-dshr-org-7999 52 8 , , , blog-dshr-org-7999 52 9 as as IN blog-dshr-org-7999 52 10 with with IN blog-dshr-org-7999 52 11 Let let NNP blog-dshr-org-7999 52 12 's -PRON- PRP blog-dshr-org-7999 52 13 Encrypt Encrypt NNP blog-dshr-org-7999 52 14 . . . blog-dshr-org-7999 53 1 Organization Organization NNP blog-dshr-org-7999 53 2 Validated Validated NNP blog-dshr-org-7999 53 3 ( ( -LRB- blog-dshr-org-7999 53 4 OV OV NNP blog-dshr-org-7999 53 5 ) ) -RRB- blog-dshr-org-7999 53 6 certificates certificate NNS blog-dshr-org-7999 53 7 are be VBP blog-dshr-org-7999 53 8 supposed suppose VBN blog-dshr-org-7999 53 9 to to TO blog-dshr-org-7999 53 10 verify verify VB blog-dshr-org-7999 53 11 the the DT blog-dshr-org-7999 53 12 legal legal JJ blog-dshr-org-7999 53 13 entity entity NN blog-dshr-org-7999 53 14 behind behind IN blog-dshr-org-7999 53 15 the the DT blog-dshr-org-7999 53 16 DV DV NNP blog-dshr-org-7999 53 17 - - HYPH blog-dshr-org-7999 53 18 level level NN blog-dshr-org-7999 53 19 control control NN blog-dshr-org-7999 53 20 of of IN blog-dshr-org-7999 53 21 the the DT blog-dshr-org-7999 53 22 domain domain NN blog-dshr-org-7999 53 23 , , , blog-dshr-org-7999 53 24 but but CC blog-dshr-org-7999 53 25 in in IN blog-dshr-org-7999 53 26 practice practice NN blog-dshr-org-7999 53 27 are be VBP blog-dshr-org-7999 53 28 treated treat VBN blog-dshr-org-7999 53 29 the the DT blog-dshr-org-7999 53 30 same same JJ blog-dshr-org-7999 53 31 as as IN blog-dshr-org-7999 53 32 DV DV NNP blog-dshr-org-7999 53 33 certificates certificate NNS blog-dshr-org-7999 53 34 . . . blog-dshr-org-7999 54 1 Extended extended JJ blog-dshr-org-7999 54 2 Validation validation NN blog-dshr-org-7999 54 3 ( ( -LRB- blog-dshr-org-7999 54 4 EV EV NNP blog-dshr-org-7999 54 5 ) ) -RRB- blog-dshr-org-7999 54 6 certificates certificate NNS blog-dshr-org-7999 54 7 require require VBP blog-dshr-org-7999 54 8 " " `` blog-dshr-org-7999 54 9 verification verification NN blog-dshr-org-7999 54 10 of of IN blog-dshr-org-7999 54 11 the the DT blog-dshr-org-7999 54 12 requesting request VBG blog-dshr-org-7999 54 13 entity entity NN blog-dshr-org-7999 54 14 's 's POS blog-dshr-org-7999 54 15 identity identity NN blog-dshr-org-7999 54 16 by by IN blog-dshr-org-7999 54 17 a a DT blog-dshr-org-7999 54 18 certificate certificate NN blog-dshr-org-7999 54 19 authority authority NN blog-dshr-org-7999 54 20 ( ( -LRB- blog-dshr-org-7999 54 21 CA CA NNP blog-dshr-org-7999 54 22 ) ) -RRB- blog-dshr-org-7999 54 23 " " '' blog-dshr-org-7999 54 24 . . . blog-dshr-org-7999 55 1 Verification verification NN blog-dshr-org-7999 55 2 is be VBZ blog-dshr-org-7999 55 3 supposed suppose VBN blog-dshr-org-7999 55 4 to to TO blog-dshr-org-7999 55 5 be be VB blog-dshr-org-7999 55 6 an an DT blog-dshr-org-7999 55 7 intrusive intrusive JJ blog-dshr-org-7999 55 8 , , , blog-dshr-org-7999 55 9 human human JJ blog-dshr-org-7999 55 10 process process NN blog-dshr-org-7999 55 11 . . . blog-dshr-org-7999 56 1 Source source NN blog-dshr-org-7999 56 2 But but CC blog-dshr-org-7999 56 3 , , , blog-dshr-org-7999 56 4 as as IN blog-dshr-org-7999 56 5 can can MD blog-dshr-org-7999 56 6 be be VB blog-dshr-org-7999 56 7 seen see VBN blog-dshr-org-7999 56 8 from from IN blog-dshr-org-7999 56 9 the the DT blog-dshr-org-7999 56 10 advert advert NN blog-dshr-org-7999 56 11 , , , blog-dshr-org-7999 56 12 the the DT blog-dshr-org-7999 56 13 Extended Extended NNP blog-dshr-org-7999 56 14 Verification Verification NNP blog-dshr-org-7999 56 15 process process NN blog-dshr-org-7999 56 16 is be VBZ blog-dshr-org-7999 56 17 far far RB blog-dshr-org-7999 56 18 from from IN blog-dshr-org-7999 56 19 fool fool NN blog-dshr-org-7999 56 20 - - HYPH blog-dshr-org-7999 56 21 proof proof NN blog-dshr-org-7999 56 22 . . . blog-dshr-org-7999 57 1 This this DT blog-dshr-org-7999 57 2 lack lack NN blog-dshr-org-7999 57 3 of of IN blog-dshr-org-7999 57 4 trustworthiness trustworthiness NN blog-dshr-org-7999 57 5 of of IN blog-dshr-org-7999 57 6 CAs ca NNS blog-dshr-org-7999 57 7 should should MD blog-dshr-org-7999 57 8 not not RB blog-dshr-org-7999 57 9 be be VB blog-dshr-org-7999 57 10 a a DT blog-dshr-org-7999 57 11 surprise surprise NN blog-dshr-org-7999 57 12 . . . blog-dshr-org-7999 58 1 Four four CD blog-dshr-org-7999 58 2 years year NNS blog-dshr-org-7999 58 3 ago ago RB blog-dshr-org-7999 58 4 Security Security NNP blog-dshr-org-7999 58 5 Collapse Collapse NNP blog-dshr-org-7999 58 6 in in IN blog-dshr-org-7999 58 7 the the DT blog-dshr-org-7999 58 8 HTTPS HTTPS NNP blog-dshr-org-7999 58 9 Market Market NNP blog-dshr-org-7999 58 10 , , , blog-dshr-org-7999 58 11 a a DT blog-dshr-org-7999 58 12 fascinating fascinating JJ blog-dshr-org-7999 58 13 analysis analysis NN blog-dshr-org-7999 58 14 of of IN blog-dshr-org-7999 58 15 the the DT blog-dshr-org-7999 58 16 ( ( -LRB- blog-dshr-org-7999 58 17 lack lack NN blog-dshr-org-7999 58 18 of of IN blog-dshr-org-7999 58 19 ) ) -RRB- blog-dshr-org-7999 58 20 security security NN blog-dshr-org-7999 58 21 on on IN blog-dshr-org-7999 58 22 the the DT blog-dshr-org-7999 58 23 Web web NN blog-dshr-org-7999 58 24 from from IN blog-dshr-org-7999 58 25 an an DT blog-dshr-org-7999 58 26 economic economic JJ blog-dshr-org-7999 58 27 rather rather RB blog-dshr-org-7999 58 28 than than IN blog-dshr-org-7999 58 29 a a DT blog-dshr-org-7999 58 30 technical technical JJ blog-dshr-org-7999 58 31 perspective perspective NN blog-dshr-org-7999 58 32 by by IN blog-dshr-org-7999 58 33 Axel Axel NNP blog-dshr-org-7999 58 34 Arnbak Arnbak NNP blog-dshr-org-7999 58 35 et et FW blog-dshr-org-7999 58 36 al al NNP blog-dshr-org-7999 58 37 from from IN blog-dshr-org-7999 58 38 Amsterdam Amsterdam NNP blog-dshr-org-7999 58 39 and and CC blog-dshr-org-7999 58 40 Delft Delft NNP blog-dshr-org-7999 58 41 Universities Universities NNPS blog-dshr-org-7999 58 42 showed show VBD blog-dshr-org-7999 58 43 that that IN blog-dshr-org-7999 58 44 CAs cas JJ blog-dshr-org-7999 58 45 lack lack NN blog-dshr-org-7999 58 46 incentives incentive NNS blog-dshr-org-7999 58 47 to to TO blog-dshr-org-7999 58 48 be be VB blog-dshr-org-7999 58 49 trustworthy trustworthy JJ blog-dshr-org-7999 58 50 . . . blog-dshr-org-7999 59 1 Arnbak Arnbak NNP blog-dshr-org-7999 59 2 et et FW blog-dshr-org-7999 59 3 al al NNP blog-dshr-org-7999 59 4 write write VB blog-dshr-org-7999 59 5 : : : blog-dshr-org-7999 59 6 A a DT blog-dshr-org-7999 59 7 crucial crucial JJ blog-dshr-org-7999 59 8 technical technical JJ blog-dshr-org-7999 59 9 property property NN blog-dshr-org-7999 59 10 of of IN blog-dshr-org-7999 59 11 the the DT blog-dshr-org-7999 59 12 HTTPS HTTPS NNP blog-dshr-org-7999 59 13 authentication authentication NN blog-dshr-org-7999 59 14 model model NN blog-dshr-org-7999 59 15 is be VBZ blog-dshr-org-7999 59 16 that that IN blog-dshr-org-7999 59 17 any any DT blog-dshr-org-7999 59 18 CA CA NNP blog-dshr-org-7999 59 19 can can MD blog-dshr-org-7999 59 20 sign sign VB blog-dshr-org-7999 59 21 certificates certificate NNS blog-dshr-org-7999 59 22 for for IN blog-dshr-org-7999 59 23 any any DT blog-dshr-org-7999 59 24 domain domain NN blog-dshr-org-7999 59 25 name name NN blog-dshr-org-7999 59 26 . . . blog-dshr-org-7999 60 1 In in IN blog-dshr-org-7999 60 2 other other JJ blog-dshr-org-7999 60 3 words word NNS blog-dshr-org-7999 60 4 , , , blog-dshr-org-7999 60 5 literally literally RB blog-dshr-org-7999 60 6 anyone anyone NN blog-dshr-org-7999 60 7 can can MD blog-dshr-org-7999 60 8 request request VB blog-dshr-org-7999 60 9 a a DT blog-dshr-org-7999 60 10 certificate certificate NN blog-dshr-org-7999 60 11 for for IN blog-dshr-org-7999 60 12 a a DT blog-dshr-org-7999 60 13 Google Google NNP blog-dshr-org-7999 60 14 domain domain NN blog-dshr-org-7999 60 15 at at IN blog-dshr-org-7999 60 16 any any DT blog-dshr-org-7999 60 17 CA CA NNP blog-dshr-org-7999 60 18 anywhere anywhere RB blog-dshr-org-7999 60 19 in in IN blog-dshr-org-7999 60 20 the the DT blog-dshr-org-7999 60 21 world world NN blog-dshr-org-7999 60 22 , , , blog-dshr-org-7999 60 23 even even RB blog-dshr-org-7999 60 24 when when WRB blog-dshr-org-7999 60 25 Google Google NNP blog-dshr-org-7999 60 26 itself -PRON- PRP blog-dshr-org-7999 60 27 has have VBZ blog-dshr-org-7999 60 28 contracted contract VBN blog-dshr-org-7999 60 29 one one CD blog-dshr-org-7999 60 30 particular particular JJ blog-dshr-org-7999 60 31 CA CA NNP blog-dshr-org-7999 60 32 to to TO blog-dshr-org-7999 60 33 sign sign VB blog-dshr-org-7999 60 34 its -PRON- PRP$ blog-dshr-org-7999 60 35 certificate certificate NN blog-dshr-org-7999 60 36 . . . blog-dshr-org-7999 61 1 This this DT blog-dshr-org-7999 61 2 " " `` blog-dshr-org-7999 61 3 technical technical JJ blog-dshr-org-7999 61 4 property property NN blog-dshr-org-7999 61 5 " " '' blog-dshr-org-7999 61 6 is be VBZ blog-dshr-org-7999 61 7 actually actually RB blog-dshr-org-7999 61 8 important important JJ blog-dshr-org-7999 61 9 , , , blog-dshr-org-7999 61 10 it -PRON- PRP blog-dshr-org-7999 61 11 is be VBZ blog-dshr-org-7999 61 12 what what WP blog-dshr-org-7999 61 13 enables enable VBZ blog-dshr-org-7999 61 14 a a DT blog-dshr-org-7999 61 15 competitive competitive JJ blog-dshr-org-7999 61 16 market market NN blog-dshr-org-7999 61 17 of of IN blog-dshr-org-7999 61 18 CAs CAs NNP blog-dshr-org-7999 61 19 . . . blog-dshr-org-7999 62 1 But but CC blog-dshr-org-7999 62 2 Symantec Symantec NNP blog-dshr-org-7999 62 3 in in IN blog-dshr-org-7999 62 4 particular particular JJ blog-dshr-org-7999 62 5 has have VBZ blog-dshr-org-7999 62 6 exploited exploit VBN blog-dshr-org-7999 62 7 it -PRON- PRP blog-dshr-org-7999 62 8 wholesale wholesale JJ blog-dshr-org-7999 62 9 : : : blog-dshr-org-7999 62 10 Google Google NNP blog-dshr-org-7999 62 11 's 's POS blog-dshr-org-7999 62 12 investigation investigation NN blog-dshr-org-7999 62 13 revealed reveal VBD blog-dshr-org-7999 62 14 that that IN blog-dshr-org-7999 62 15 over over IN blog-dshr-org-7999 62 16 a a DT blog-dshr-org-7999 62 17 span span NN blog-dshr-org-7999 62 18 of of IN blog-dshr-org-7999 62 19 years year NNS blog-dshr-org-7999 62 20 , , , blog-dshr-org-7999 62 21 Symantec Symantec NNP blog-dshr-org-7999 62 22 CAs ca NNS blog-dshr-org-7999 62 23 have have VBP blog-dshr-org-7999 62 24 improperly improperly RB blog-dshr-org-7999 62 25 issued issue VBN blog-dshr-org-7999 62 26 more more JJR blog-dshr-org-7999 62 27 than than IN blog-dshr-org-7999 62 28 30,000 30,000 CD blog-dshr-org-7999 62 29 certificates certificate NNS blog-dshr-org-7999 62 30 . . . blog-dshr-org-7999 63 1 Such such JJ blog-dshr-org-7999 63 2 mis mis NN blog-dshr-org-7999 63 3 - - HYPH blog-dshr-org-7999 63 4 issued issue VBN blog-dshr-org-7999 63 5 certificates certificate NNS blog-dshr-org-7999 63 6 represent represent VBP blog-dshr-org-7999 63 7 a a DT blog-dshr-org-7999 63 8 potentially potentially RB blog-dshr-org-7999 63 9 critical critical JJ blog-dshr-org-7999 63 10 threat threat NN blog-dshr-org-7999 63 11 to to IN blog-dshr-org-7999 63 12 virtually virtually RB blog-dshr-org-7999 63 13 the the DT blog-dshr-org-7999 63 14 entire entire JJ blog-dshr-org-7999 63 15 Internet internet NN blog-dshr-org-7999 63 16 population population NN blog-dshr-org-7999 63 17 because because IN blog-dshr-org-7999 63 18 they -PRON- PRP blog-dshr-org-7999 63 19 make make VBP blog-dshr-org-7999 63 20 it -PRON- PRP blog-dshr-org-7999 63 21 possible possible JJ blog-dshr-org-7999 63 22 for for IN blog-dshr-org-7999 63 23 the the DT blog-dshr-org-7999 63 24 holders holder NNS blog-dshr-org-7999 63 25 to to TO blog-dshr-org-7999 63 26 cryptographically cryptographically RB blog-dshr-org-7999 63 27 impersonate impersonate VB blog-dshr-org-7999 63 28 the the DT blog-dshr-org-7999 63 29 affected affect VBN blog-dshr-org-7999 63 30 sites site NNS blog-dshr-org-7999 63 31 and and CC blog-dshr-org-7999 63 32 monitor monitor NN blog-dshr-org-7999 63 33 communications communication NNS blog-dshr-org-7999 63 34 sent send VBN blog-dshr-org-7999 63 35 to to IN blog-dshr-org-7999 63 36 and and CC blog-dshr-org-7999 63 37 from from IN blog-dshr-org-7999 63 38 the the DT blog-dshr-org-7999 63 39 legitimate legitimate JJ blog-dshr-org-7999 63 40 servers server NNS blog-dshr-org-7999 63 41 . . . blog-dshr-org-7999 64 1 They -PRON- PRP blog-dshr-org-7999 64 2 are be VBP blog-dshr-org-7999 64 3 a a DT blog-dshr-org-7999 64 4 major major JJ blog-dshr-org-7999 64 5 violation violation NN blog-dshr-org-7999 64 6 of of IN blog-dshr-org-7999 64 7 the the DT blog-dshr-org-7999 64 8 so so RB blog-dshr-org-7999 64 9 - - HYPH blog-dshr-org-7999 64 10 called call VBN blog-dshr-org-7999 64 11 baseline baseline NN blog-dshr-org-7999 64 12 requirements requirement NNS blog-dshr-org-7999 64 13 that that IN blog-dshr-org-7999 64 14 major major JJ blog-dshr-org-7999 64 15 browser browser NN blog-dshr-org-7999 64 16 makers maker NNS blog-dshr-org-7999 64 17 impose impose VBP blog-dshr-org-7999 64 18 of of IN blog-dshr-org-7999 64 19 CAs CAs NNP blog-dshr-org-7999 64 20 as as IN blog-dshr-org-7999 64 21 a a DT blog-dshr-org-7999 64 22 condition condition NN blog-dshr-org-7999 64 23 of of IN blog-dshr-org-7999 64 24 being be VBG blog-dshr-org-7999 64 25 trusted trust VBN blog-dshr-org-7999 64 26 by by IN blog-dshr-org-7999 64 27 major major JJ blog-dshr-org-7999 64 28 browsers browser NNS blog-dshr-org-7999 64 29 . . . blog-dshr-org-7999 65 1 But but CC blog-dshr-org-7999 65 2 Symantec Symantec NNP blog-dshr-org-7999 65 3 has have VBZ blog-dshr-org-7999 65 4 suffered suffer VBN blog-dshr-org-7999 65 5 no no DT blog-dshr-org-7999 65 6 effective effective JJ blog-dshr-org-7999 65 7 sanctions sanction NNS blog-dshr-org-7999 65 8 because because IN blog-dshr-org-7999 65 9 they -PRON- PRP blog-dshr-org-7999 65 10 are be VBP blog-dshr-org-7999 65 11 too too RB blog-dshr-org-7999 65 12 big big JJ blog-dshr-org-7999 65 13 to to TO blog-dshr-org-7999 65 14 fail fail VB blog-dshr-org-7999 65 15 : : : blog-dshr-org-7999 65 16 Symantec Symantec NNP blog-dshr-org-7999 65 17 's 's POS blog-dshr-org-7999 65 18 repeated repeated JJ blog-dshr-org-7999 65 19 violations violation NNS blog-dshr-org-7999 65 20 underscore underscore VBP blog-dshr-org-7999 65 21 one one CD blog-dshr-org-7999 65 22 of of IN blog-dshr-org-7999 65 23 the the DT blog-dshr-org-7999 65 24 problems problem NNS blog-dshr-org-7999 65 25 Google Google NNP blog-dshr-org-7999 65 26 and and CC blog-dshr-org-7999 65 27 others other NNS blog-dshr-org-7999 65 28 have have VBP blog-dshr-org-7999 65 29 in in IN blog-dshr-org-7999 65 30 enforcing enforce VBG blog-dshr-org-7999 65 31 terms term NNS blog-dshr-org-7999 65 32 of of IN blog-dshr-org-7999 65 33 the the DT blog-dshr-org-7999 65 34 baseline baseline NN blog-dshr-org-7999 65 35 requirements requirement NNS blog-dshr-org-7999 65 36 . . . blog-dshr-org-7999 66 1 When when WRB blog-dshr-org-7999 66 2 violations violation NNS blog-dshr-org-7999 66 3 are be VBP blog-dshr-org-7999 66 4 carried carry VBN blog-dshr-org-7999 66 5 out out RP blog-dshr-org-7999 66 6 by by IN blog-dshr-org-7999 66 7 issuers issuer NNS blog-dshr-org-7999 66 8 with with IN blog-dshr-org-7999 66 9 a a DT blog-dshr-org-7999 66 10 big big JJ blog-dshr-org-7999 66 11 enough enough JJ blog-dshr-org-7999 66 12 market market NN blog-dshr-org-7999 66 13 share share NN blog-dshr-org-7999 66 14 they -PRON- PRP blog-dshr-org-7999 66 15 're be VBP blog-dshr-org-7999 66 16 considered consider VBN blog-dshr-org-7999 66 17 too too RB blog-dshr-org-7999 66 18 big big JJ blog-dshr-org-7999 66 19 to to TO blog-dshr-org-7999 66 20 fail fail VB blog-dshr-org-7999 66 21 . . . blog-dshr-org-7999 67 1 If if IN blog-dshr-org-7999 67 2 Google Google NNP blog-dshr-org-7999 67 3 were be VBD blog-dshr-org-7999 67 4 to to TO blog-dshr-org-7999 67 5 nullify nullify VB blog-dshr-org-7999 67 6 all all DT blog-dshr-org-7999 67 7 of of IN blog-dshr-org-7999 67 8 the the DT blog-dshr-org-7999 67 9 Symantec Symantec NNP blog-dshr-org-7999 67 10 - - HYPH blog-dshr-org-7999 67 11 issued issue VBN blog-dshr-org-7999 67 12 certificates certificate NNS blog-dshr-org-7999 67 13 overnight overnight RB blog-dshr-org-7999 67 14 , , , blog-dshr-org-7999 67 15 it -PRON- PRP blog-dshr-org-7999 67 16 might may MD blog-dshr-org-7999 67 17 cause cause VB blog-dshr-org-7999 67 18 widespread widespread JJ blog-dshr-org-7999 67 19 outages outage NNS blog-dshr-org-7999 67 20 . . . blog-dshr-org-7999 68 1 My -PRON- PRP$ blog-dshr-org-7999 68 2 Firefox Firefox NNP blog-dshr-org-7999 68 3 still still RB blog-dshr-org-7999 68 4 trusts trust VBZ blog-dshr-org-7999 68 5 Symantec Symantec NNP blog-dshr-org-7999 68 6 root root NN blog-dshr-org-7999 68 7 certificates certificate NNS blog-dshr-org-7999 68 8 . . . blog-dshr-org-7999 69 1 Because because IN blog-dshr-org-7999 69 2 Google Google NNP blog-dshr-org-7999 69 3 , , , blog-dshr-org-7999 69 4 Mozilla Mozilla NNP blog-dshr-org-7999 69 5 and and CC blog-dshr-org-7999 69 6 others other NNS blog-dshr-org-7999 69 7 prioritize prioritize VBP blog-dshr-org-7999 69 8 keeping keep VBG blog-dshr-org-7999 69 9 the the DT blog-dshr-org-7999 69 10 Web web NN blog-dshr-org-7999 69 11 working work VBG blog-dshr-org-7999 69 12 over over IN blog-dshr-org-7999 69 13 keeping keep VBG blog-dshr-org-7999 69 14 it -PRON- PRP blog-dshr-org-7999 69 15 secure secure JJ blog-dshr-org-7999 69 16 , , , blog-dshr-org-7999 69 17 deleting delete VBG blog-dshr-org-7999 69 18 misbehaving misbehave VBG blog-dshr-org-7999 69 19 big big JJ blog-dshr-org-7999 69 20 CAs ca NNS blog-dshr-org-7999 69 21 from from IN blog-dshr-org-7999 69 22 trust trust NN blog-dshr-org-7999 69 23 lists list NNS blog-dshr-org-7999 69 24 wo will MD blog-dshr-org-7999 69 25 n't not RB blog-dshr-org-7999 69 26 happen happen VB blog-dshr-org-7999 69 27 . . . blog-dshr-org-7999 70 1 When when WRB blog-dshr-org-7999 70 2 Mozilla Mozilla NNP blog-dshr-org-7999 70 3 writes write VBZ blog-dshr-org-7999 70 4 : : : blog-dshr-org-7999 70 5 You -PRON- PRP blog-dshr-org-7999 70 6 are be VBP blog-dshr-org-7999 70 7 definitely definitely RB blog-dshr-org-7999 70 8 connected connected JJ blog-dshr-org-7999 70 9 to to IN blog-dshr-org-7999 70 10 the the DT blog-dshr-org-7999 70 11 website website NN blog-dshr-org-7999 70 12 whose whose WP$ blog-dshr-org-7999 70 13 address address NN blog-dshr-org-7999 70 14 is be VBZ blog-dshr-org-7999 70 15 shown show VBN blog-dshr-org-7999 70 16 in in IN blog-dshr-org-7999 70 17 the the DT blog-dshr-org-7999 70 18 address address NN blog-dshr-org-7999 70 19 bar bar NN blog-dshr-org-7999 70 20 ; ; : blog-dshr-org-7999 70 21 the the DT blog-dshr-org-7999 70 22 connection connection NN blog-dshr-org-7999 70 23 has have VBZ blog-dshr-org-7999 70 24 not not RB blog-dshr-org-7999 70 25 been be VBN blog-dshr-org-7999 70 26 intercepted intercept VBN blog-dshr-org-7999 70 27 . . . blog-dshr-org-7999 71 1 they -PRON- PRP blog-dshr-org-7999 71 2 are be VBP blog-dshr-org-7999 71 3 assuming assume VBG blog-dshr-org-7999 71 4 a a DT blog-dshr-org-7999 71 5 world world NN blog-dshr-org-7999 71 6 of of IN blog-dshr-org-7999 71 7 honest honest JJ blog-dshr-org-7999 71 8 CAs ca NNS blog-dshr-org-7999 71 9 that that WDT blog-dshr-org-7999 71 10 is be VBZ blog-dshr-org-7999 71 11 n't not RB blog-dshr-org-7999 71 12 this this DT blog-dshr-org-7999 71 13 world world NN blog-dshr-org-7999 71 14 . . . blog-dshr-org-7999 72 1 If if IN blog-dshr-org-7999 72 2 you -PRON- PRP blog-dshr-org-7999 72 3 have have VBP blog-dshr-org-7999 72 4 the the DT blog-dshr-org-7999 72 5 locked lock VBN blog-dshr-org-7999 72 6 padlock padlock NN blog-dshr-org-7999 72 7 icon icon NN blog-dshr-org-7999 72 8 in in IN blog-dshr-org-7999 72 9 your -PRON- PRP$ blog-dshr-org-7999 72 10 URL url NN blog-dshr-org-7999 72 11 bar bar NN blog-dshr-org-7999 72 12 , , , blog-dshr-org-7999 72 13 you -PRON- PRP blog-dshr-org-7999 72 14 are be VBP blog-dshr-org-7999 72 15 probably probably RB blog-dshr-org-7999 72 16 talking talk VBG blog-dshr-org-7999 72 17 to to IN blog-dshr-org-7999 72 18 the the DT blog-dshr-org-7999 72 19 right right JJ blog-dshr-org-7999 72 20 Web web NN blog-dshr-org-7999 72 21 site site NN blog-dshr-org-7999 72 22 , , , blog-dshr-org-7999 72 23 but but CC blog-dshr-org-7999 72 24 there there EX blog-dshr-org-7999 72 25 is be VBZ blog-dshr-org-7999 72 26 a a DT blog-dshr-org-7999 72 27 chance chance NN blog-dshr-org-7999 72 28 you -PRON- PRP blog-dshr-org-7999 72 29 are be VBP blog-dshr-org-7999 72 30 n't not RB blog-dshr-org-7999 72 31 . . . blog-dshr-org-7999 73 1 Even even RB blog-dshr-org-7999 73 2 if if IN blog-dshr-org-7999 73 3 you -PRON- PRP blog-dshr-org-7999 73 4 are be VBP blog-dshr-org-7999 73 5 talking talk VBG blog-dshr-org-7999 73 6 to to IN blog-dshr-org-7999 73 7 the the DT blog-dshr-org-7999 73 8 domain domain NN blog-dshr-org-7999 73 9 in in IN blog-dshr-org-7999 73 10 the the DT blog-dshr-org-7999 73 11 URL URL NNP blog-dshr-org-7999 73 12 , , , blog-dshr-org-7999 73 13 Brian Brian NNP blog-dshr-org-7999 73 14 Krebs Krebs NNP blog-dshr-org-7999 73 15 reports report VBZ blog-dshr-org-7999 73 16 that that IN blog-dshr-org-7999 73 17 : : : blog-dshr-org-7999 73 18 Recent recent JJ blog-dshr-org-7999 73 19 data datum NNS blog-dshr-org-7999 73 20 from from IN blog-dshr-org-7999 73 21 anti anti JJ blog-dshr-org-7999 73 22 - - JJ blog-dshr-org-7999 73 23 phishing phishing JJ blog-dshr-org-7999 73 24 company company NN blog-dshr-org-7999 73 25 PhishLabs PhishLabs NNP blog-dshr-org-7999 73 26 shows show VBZ blog-dshr-org-7999 73 27 that that IN blog-dshr-org-7999 73 28 49 49 CD blog-dshr-org-7999 73 29 percent percent NN blog-dshr-org-7999 73 30 of of IN blog-dshr-org-7999 73 31 all all DT blog-dshr-org-7999 73 32 phishing phishe VBG blog-dshr-org-7999 73 33 sites site NNS blog-dshr-org-7999 73 34 in in IN blog-dshr-org-7999 73 35 the the DT blog-dshr-org-7999 73 36 third third JJ blog-dshr-org-7999 73 37 quarter quarter NN blog-dshr-org-7999 73 38 of of IN blog-dshr-org-7999 73 39 2018 2018 CD blog-dshr-org-7999 73 40 bore bear VBD blog-dshr-org-7999 73 41 the the DT blog-dshr-org-7999 73 42 padlock padlock NNP blog-dshr-org-7999 73 43 security security NN blog-dshr-org-7999 73 44 icon icon NN blog-dshr-org-7999 73 45 next next RB blog-dshr-org-7999 73 46 to to IN blog-dshr-org-7999 73 47 the the DT blog-dshr-org-7999 73 48 phishing phishe VBG blog-dshr-org-7999 73 49 site site NN blog-dshr-org-7999 73 50 domain domain NN blog-dshr-org-7999 73 51 name name NN blog-dshr-org-7999 73 52 as as IN blog-dshr-org-7999 73 53 displayed display VBN blog-dshr-org-7999 73 54 in in IN blog-dshr-org-7999 73 55 a a DT blog-dshr-org-7999 73 56 browser browser NN blog-dshr-org-7999 73 57 address address NN blog-dshr-org-7999 73 58 bar bar NN blog-dshr-org-7999 73 59 . . . blog-dshr-org-7999 74 1 That that DT blog-dshr-org-7999 74 2 ’s ’ VBZ blog-dshr-org-7999 74 3 up up RB blog-dshr-org-7999 74 4 from from IN blog-dshr-org-7999 74 5 25 25 CD blog-dshr-org-7999 74 6 percent percent NN blog-dshr-org-7999 74 7 just just RB blog-dshr-org-7999 74 8 one one CD blog-dshr-org-7999 74 9 year year NN blog-dshr-org-7999 74 10 ago ago RB blog-dshr-org-7999 74 11 , , , blog-dshr-org-7999 74 12 and and CC blog-dshr-org-7999 74 13 from from IN blog-dshr-org-7999 74 14 35 35 CD blog-dshr-org-7999 74 15 percent percent NN blog-dshr-org-7999 74 16 in in IN blog-dshr-org-7999 74 17 the the DT blog-dshr-org-7999 74 18 second second JJ blog-dshr-org-7999 74 19 quarter quarter NN blog-dshr-org-7999 74 20 of of IN blog-dshr-org-7999 74 21 2018 2018 CD blog-dshr-org-7999 74 22 . . . blog-dshr-org-7999 75 1 Efforts effort NNS blog-dshr-org-7999 75 2 to to TO blog-dshr-org-7999 75 3 reduce reduce VB blog-dshr-org-7999 75 4 the the DT blog-dshr-org-7999 75 5 chance chance NN blog-dshr-org-7999 75 6 that that IN blog-dshr-org-7999 75 7 you -PRON- PRP blog-dshr-org-7999 75 8 are be VBP blog-dshr-org-7999 75 9 n't not RB blog-dshr-org-7999 75 10 have have VBP blog-dshr-org-7999 75 11 been be VBN blog-dshr-org-7999 75 12 under under IN blog-dshr-org-7999 75 13 way way NN blog-dshr-org-7999 75 14 for for IN blog-dshr-org-7999 75 15 a a DT blog-dshr-org-7999 75 16 long long JJ blog-dshr-org-7999 75 17 time time NN blog-dshr-org-7999 75 18 . . . blog-dshr-org-7999 76 1 In in IN blog-dshr-org-7999 76 2 2008 2008 CD blog-dshr-org-7999 76 3 Wendlandt Wendlandt NNP blog-dshr-org-7999 76 4 et et NNP blog-dshr-org-7999 76 5 al al NNP blog-dshr-org-7999 76 6 published publish VBD blog-dshr-org-7999 76 7 Perspectives perspective NNS blog-dshr-org-7999 76 8 : : : blog-dshr-org-7999 76 9 Improving improve VBG blog-dshr-org-7999 76 10 SSH SSH NNP blog-dshr-org-7999 76 11 - - HYPH blog-dshr-org-7999 76 12 style style NN blog-dshr-org-7999 76 13 Host Host NNP blog-dshr-org-7999 76 14 Authentication Authentication NNP blog-dshr-org-7999 76 15 with with IN blog-dshr-org-7999 76 16 Multi Multi NNP blog-dshr-org-7999 76 17 - - NNP blog-dshr-org-7999 76 18 Path Path NNP blog-dshr-org-7999 76 19 Probing Probing NNP blog-dshr-org-7999 76 20 , , , blog-dshr-org-7999 76 21 describing describe VBG blog-dshr-org-7999 76 22 a a DT blog-dshr-org-7999 76 23 system system NN blog-dshr-org-7999 76 24 that that WDT blog-dshr-org-7999 76 25 : : : blog-dshr-org-7999 76 26 thwarts thwart NNS blog-dshr-org-7999 76 27 many many JJ blog-dshr-org-7999 76 28 of of IN blog-dshr-org-7999 76 29 these these DT blog-dshr-org-7999 76 30 attacks attack NNS blog-dshr-org-7999 76 31 by by IN blog-dshr-org-7999 76 32 using use VBG blog-dshr-org-7999 76 33 a a DT blog-dshr-org-7999 76 34 collection collection NN blog-dshr-org-7999 76 35 of of IN blog-dshr-org-7999 76 36 “ " `` blog-dshr-org-7999 76 37 notary notary JJ blog-dshr-org-7999 76 38 ” " '' blog-dshr-org-7999 76 39 hosts host NNS blog-dshr-org-7999 76 40 that that WDT blog-dshr-org-7999 76 41 observes observe VBZ blog-dshr-org-7999 76 42 a a DT blog-dshr-org-7999 76 43 server server NN blog-dshr-org-7999 76 44 ’s ’s POS blog-dshr-org-7999 76 45 public public JJ blog-dshr-org-7999 76 46 key key NN blog-dshr-org-7999 76 47 via via IN blog-dshr-org-7999 76 48 multiple multiple JJ blog-dshr-org-7999 76 49 network network NN blog-dshr-org-7999 76 50 vantage vantage NN blog-dshr-org-7999 76 51 points point NNS blog-dshr-org-7999 76 52 ( ( -LRB- blog-dshr-org-7999 76 53 detecting detect VBG blog-dshr-org-7999 76 54 localized localize VBN blog-dshr-org-7999 76 55 attacks attack NNS blog-dshr-org-7999 76 56 ) ) -RRB- blog-dshr-org-7999 76 57 and and CC blog-dshr-org-7999 76 58 keeps keep VBZ blog-dshr-org-7999 76 59 a a DT blog-dshr-org-7999 76 60 record record NN blog-dshr-org-7999 76 61 of of IN blog-dshr-org-7999 76 62 the the DT blog-dshr-org-7999 76 63 server server NN blog-dshr-org-7999 76 64 ’s ’s POS blog-dshr-org-7999 76 65 key key NN blog-dshr-org-7999 76 66 over over IN blog-dshr-org-7999 76 67 time time NN blog-dshr-org-7999 76 68 ( ( -LRB- blog-dshr-org-7999 76 69 recognizing recognize VBG blog-dshr-org-7999 76 70 short short RB blog-dshr-org-7999 76 71 - - HYPH blog-dshr-org-7999 76 72 lived live VBN blog-dshr-org-7999 76 73 attacks attack NNS blog-dshr-org-7999 76 74 ) ) -RRB- blog-dshr-org-7999 76 75 . . . blog-dshr-org-7999 77 1 Clients client NNS blog-dshr-org-7999 77 2 can can MD blog-dshr-org-7999 77 3 download download VB blog-dshr-org-7999 77 4 these these DT blog-dshr-org-7999 77 5 records record NNS blog-dshr-org-7999 77 6 on on IN blog-dshr-org-7999 77 7 - - HYPH blog-dshr-org-7999 77 8 demand demand NN blog-dshr-org-7999 77 9 and and CC blog-dshr-org-7999 77 10 compare compare VB blog-dshr-org-7999 77 11 them -PRON- PRP blog-dshr-org-7999 77 12 against against IN blog-dshr-org-7999 77 13 an an DT blog-dshr-org-7999 77 14 unauthenticated unauthenticated JJ blog-dshr-org-7999 77 15 key key NN blog-dshr-org-7999 77 16 , , , blog-dshr-org-7999 77 17 This this DT blog-dshr-org-7999 77 18 is be VBZ blog-dshr-org-7999 77 19 the the DT blog-dshr-org-7999 77 20 basic basic JJ blog-dshr-org-7999 77 21 idea idea NN blog-dshr-org-7999 77 22 that that WDT blog-dshr-org-7999 77 23 underlay underlay VBP blog-dshr-org-7999 77 24 the the DT blog-dshr-org-7999 77 25 early early JJ blog-dshr-org-7999 77 26 efforts effort NNS blog-dshr-org-7999 77 27 . . . blog-dshr-org-7999 78 1 Except except IN blog-dshr-org-7999 78 2 for for IN blog-dshr-org-7999 78 3 rare rare JJ blog-dshr-org-7999 78 4 cases case NNS blog-dshr-org-7999 78 5 , , , blog-dshr-org-7999 78 6 such such JJ blog-dshr-org-7999 78 7 as as IN blog-dshr-org-7999 78 8 a a DT blog-dshr-org-7999 78 9 certificate certificate NN blog-dshr-org-7999 78 10 being being NN blog-dshr-org-7999 78 11 replaced replace VBN blog-dshr-org-7999 78 12 after after IN blog-dshr-org-7999 78 13 compromise compromise NN blog-dshr-org-7999 78 14 or or CC blog-dshr-org-7999 78 15 expiration expiration NN blog-dshr-org-7999 78 16 , , , blog-dshr-org-7999 78 17 every every DT blog-dshr-org-7999 78 18 time time NN blog-dshr-org-7999 78 19 a a DT blog-dshr-org-7999 78 20 service service NN blog-dshr-org-7999 78 21 is be VBZ blog-dshr-org-7999 78 22 accessed access VBN blog-dshr-org-7999 78 23 the the DT blog-dshr-org-7999 78 24 client client NN blog-dshr-org-7999 78 25 should should MD blog-dshr-org-7999 78 26 receive receive VB blog-dshr-org-7999 78 27 the the DT blog-dshr-org-7999 78 28 same same JJ blog-dshr-org-7999 78 29 certificate certificate NN blog-dshr-org-7999 78 30 . . . blog-dshr-org-7999 79 1 Clients client NNS blog-dshr-org-7999 79 2 can can MD blog-dshr-org-7999 79 3 consult consult VB blog-dshr-org-7999 79 4 a a DT blog-dshr-org-7999 79 5 service service NN blog-dshr-org-7999 79 6 that that WDT blog-dshr-org-7999 79 7 collects collect VBZ blog-dshr-org-7999 79 8 the the DT blog-dshr-org-7999 79 9 ( ( -LRB- blog-dshr-org-7999 79 10 hash hash NN blog-dshr-org-7999 79 11 of of IN blog-dshr-org-7999 79 12 ) ) -RRB- blog-dshr-org-7999 79 13 certificates certificate NNS blog-dshr-org-7999 79 14 as as IN blog-dshr-org-7999 79 15 they -PRON- PRP blog-dshr-org-7999 79 16 are be VBP blog-dshr-org-7999 79 17 received receive VBN blog-dshr-org-7999 79 18 at at IN blog-dshr-org-7999 79 19 locations location NNS blog-dshr-org-7999 79 20 all all RB blog-dshr-org-7999 79 21 over over IN blog-dshr-org-7999 79 22 the the DT blog-dshr-org-7999 79 23 Internet internet NN blog-dshr-org-7999 79 24 to to TO blog-dshr-org-7999 79 25 detect detect VB blog-dshr-org-7999 79 26 the the DT blog-dshr-org-7999 79 27 use use NN blog-dshr-org-7999 79 28 of of IN blog-dshr-org-7999 79 29 fraudulent fraudulent JJ blog-dshr-org-7999 79 30 certificates certificate NNS blog-dshr-org-7999 79 31 . . . blog-dshr-org-7999 80 1 Five five CD blog-dshr-org-7999 80 2 years year NNS blog-dshr-org-7999 80 3 ago ago RB blog-dshr-org-7999 80 4 in in IN blog-dshr-org-7999 80 5   _SP blog-dshr-org-7999 80 6 Trust Trust NNP blog-dshr-org-7999 80 7 in in IN blog-dshr-org-7999 80 8 Computer Computer NNP blog-dshr-org-7999 80 9 Systems Systems NNPS blog-dshr-org-7999 80 10 I -PRON- PRP blog-dshr-org-7999 80 11 reviewed review VBD blog-dshr-org-7999 80 12 the the DT blog-dshr-org-7999 80 13 state state NN blog-dshr-org-7999 80 14 of of IN blog-dshr-org-7999 80 15 the the DT blog-dshr-org-7999 80 16 art art NN blog-dshr-org-7999 80 17 in in IN blog-dshr-org-7999 80 18 implementing implement VBG blog-dshr-org-7999 80 19 this this DT blog-dshr-org-7999 80 20 concept concept NN blog-dshr-org-7999 80 21 , , , blog-dshr-org-7999 80 22 including include VBG blog-dshr-org-7999 80 23 Moxie Moxie NNP blog-dshr-org-7999 80 24 Marlinspike Marlinspike NNP blog-dshr-org-7999 80 25 's 's POS blog-dshr-org-7999 80 26 2011 2011 CD blog-dshr-org-7999 80 27 Convergence Convergence NNP blog-dshr-org-7999 80 28 , , , blog-dshr-org-7999 80 29 a a DT blog-dshr-org-7999 80 30 distributed distribute VBN blog-dshr-org-7999 80 31 approach approach NN blog-dshr-org-7999 80 32 , , , blog-dshr-org-7999 80 33 and and CC blog-dshr-org-7999 80 34 the the DT blog-dshr-org-7999 80 35 EFF EFF NNP blog-dshr-org-7999 80 36 's 's POS blog-dshr-org-7999 80 37 SSL SSL NNP blog-dshr-org-7999 80 38 Observatory Observatory NNP blog-dshr-org-7999 80 39 , , , blog-dshr-org-7999 80 40 a a DT blog-dshr-org-7999 80 41 centralized centralized JJ blog-dshr-org-7999 80 42 approach approach NN blog-dshr-org-7999 80 43 . . . blog-dshr-org-7999 81 1 Note note VB blog-dshr-org-7999 81 2 that that IN blog-dshr-org-7999 81 3 both both DT blog-dshr-org-7999 81 4 approaches approach NNS blog-dshr-org-7999 81 5 are be VBP blog-dshr-org-7999 81 6 implemented implement VBN blog-dshr-org-7999 81 7 without without IN blog-dshr-org-7999 81 8 participation participation NN blog-dshr-org-7999 81 9 by by IN blog-dshr-org-7999 81 10 certificate certificate NN blog-dshr-org-7999 81 11 authorities authority NNS blog-dshr-org-7999 81 12 or or CC blog-dshr-org-7999 81 13 owners owner NNS blog-dshr-org-7999 81 14 , , , blog-dshr-org-7999 81 15 and and CC blog-dshr-org-7999 81 16 neither neither DT blog-dshr-org-7999 81 17 has have VBZ blog-dshr-org-7999 81 18 achieved achieve VBN blog-dshr-org-7999 81 19 widespread widespread JJ blog-dshr-org-7999 81 20 adoption adoption NN blog-dshr-org-7999 81 21 . . . blog-dshr-org-7999 82 1 In in IN blog-dshr-org-7999 82 2 2012 2012 CD blog-dshr-org-7999 82 3 Google Google NNP blog-dshr-org-7999 82 4 started start VBD blog-dshr-org-7999 82 5 work work NN blog-dshr-org-7999 82 6 on on IN blog-dshr-org-7999 82 7 an an DT blog-dshr-org-7999 82 8 approach approach NN blog-dshr-org-7999 82 9 that that WDT blog-dshr-org-7999 82 10 requires require VBZ blog-dshr-org-7999 82 11 participation participation NN blog-dshr-org-7999 82 12 by by IN blog-dshr-org-7999 82 13 certificate certificate NN blog-dshr-org-7999 82 14 owners owner NNS blog-dshr-org-7999 82 15 , , , blog-dshr-org-7999 82 16 specified specify VBN blog-dshr-org-7999 82 17 in in IN blog-dshr-org-7999 82 18 RFC6962 RFC6962 NNP blog-dshr-org-7999 82 19 , , , blog-dshr-org-7999 82 20 and and CC blog-dshr-org-7999 82 21 called call VBD blog-dshr-org-7999 82 22 Certificate Certificate NNP blog-dshr-org-7999 82 23 Transparency Transparency NNP blog-dshr-org-7999 82 24 ( ( -LRB- blog-dshr-org-7999 82 25 CT CT NNP blog-dshr-org-7999 82 26 ) ) -RRB- blog-dshr-org-7999 82 27 : : : blog-dshr-org-7999 82 28 Google Google NNP blog-dshr-org-7999 82 29 's 's POS blog-dshr-org-7999 82 30 Certificate Certificate NNP blog-dshr-org-7999 82 31 Transparency Transparency NNP blog-dshr-org-7999 82 32 project project NN blog-dshr-org-7999 82 33 fixes fix VBZ blog-dshr-org-7999 82 34 several several JJ blog-dshr-org-7999 82 35 structural structural JJ blog-dshr-org-7999 82 36 flaws flaw NNS blog-dshr-org-7999 82 37 in in IN blog-dshr-org-7999 82 38 the the DT blog-dshr-org-7999 82 39 SSL SSL NNP blog-dshr-org-7999 82 40 certificate certificate NN blog-dshr-org-7999 82 41 system system NN blog-dshr-org-7999 82 42 , , , blog-dshr-org-7999 82 43 which which WDT blog-dshr-org-7999 82 44 is be VBZ blog-dshr-org-7999 82 45 the the DT blog-dshr-org-7999 82 46 main main JJ blog-dshr-org-7999 82 47 cryptographic cryptographic JJ blog-dshr-org-7999 82 48 system system NN blog-dshr-org-7999 82 49 that that WDT blog-dshr-org-7999 82 50 underlies underlie VBZ blog-dshr-org-7999 82 51 all all DT blog-dshr-org-7999 82 52 HTTPS HTTPS NNP blog-dshr-org-7999 82 53 connections connection NNS blog-dshr-org-7999 82 54 . . . blog-dshr-org-7999 83 1 These these DT blog-dshr-org-7999 83 2 flaws flaw NNS blog-dshr-org-7999 83 3 weaken weaken VBP blog-dshr-org-7999 83 4 the the DT blog-dshr-org-7999 83 5 reliability reliability NN blog-dshr-org-7999 83 6 and and CC blog-dshr-org-7999 83 7 effectiveness effectiveness NN blog-dshr-org-7999 83 8 of of IN blog-dshr-org-7999 83 9 encrypted encrypt VBN blog-dshr-org-7999 83 10 Internet internet NN blog-dshr-org-7999 83 11 connections connection NNS blog-dshr-org-7999 83 12 and and CC blog-dshr-org-7999 83 13 can can MD blog-dshr-org-7999 83 14 compromise compromise VB blog-dshr-org-7999 83 15 critical critical JJ blog-dshr-org-7999 83 16 TLS TLS NNP blog-dshr-org-7999 83 17 / / SYM blog-dshr-org-7999 83 18 SSL SSL NNP blog-dshr-org-7999 83 19 mechanisms mechanism NNS blog-dshr-org-7999 83 20 , , , blog-dshr-org-7999 83 21 including include VBG blog-dshr-org-7999 83 22 domain domain NN blog-dshr-org-7999 83 23 validation validation NN blog-dshr-org-7999 83 24 , , , blog-dshr-org-7999 83 25 end end NN blog-dshr-org-7999 83 26 - - HYPH blog-dshr-org-7999 83 27 to to IN blog-dshr-org-7999 83 28 - - HYPH blog-dshr-org-7999 83 29 end end NN blog-dshr-org-7999 83 30 encryption encryption NN blog-dshr-org-7999 83 31 , , , blog-dshr-org-7999 83 32 and and CC blog-dshr-org-7999 83 33 the the DT blog-dshr-org-7999 83 34 chains chain NNS blog-dshr-org-7999 83 35 of of IN blog-dshr-org-7999 83 36 trust trust NN blog-dshr-org-7999 83 37 set set VBN blog-dshr-org-7999 83 38 up up RP blog-dshr-org-7999 83 39 by by IN blog-dshr-org-7999 83 40 certificate certificate NN blog-dshr-org-7999 83 41 authorities authority NNS blog-dshr-org-7999 83 42 . . . blog-dshr-org-7999 84 1 If if IN blog-dshr-org-7999 84 2 left left JJ blog-dshr-org-7999 84 3 unchecked unchecked JJ blog-dshr-org-7999 84 4 , , , blog-dshr-org-7999 84 5 these these DT blog-dshr-org-7999 84 6 flaws flaw NNS blog-dshr-org-7999 84 7 can can MD blog-dshr-org-7999 84 8 facilitate facilitate VB blog-dshr-org-7999 84 9 a a DT blog-dshr-org-7999 84 10 wide wide JJ blog-dshr-org-7999 84 11 range range NN blog-dshr-org-7999 84 12 of of IN blog-dshr-org-7999 84 13 security security NN blog-dshr-org-7999 84 14 attacks attack NNS blog-dshr-org-7999 84 15 , , , blog-dshr-org-7999 84 16 such such JJ blog-dshr-org-7999 84 17 as as IN blog-dshr-org-7999 84 18 website website NN blog-dshr-org-7999 84 19 spoofing spoofing NN blog-dshr-org-7999 84 20 , , , blog-dshr-org-7999 84 21 server server NN blog-dshr-org-7999 84 22 impersonation impersonation NN blog-dshr-org-7999 84 23 , , , blog-dshr-org-7999 84 24 and and CC blog-dshr-org-7999 84 25 man man NN blog-dshr-org-7999 84 26 - - HYPH blog-dshr-org-7999 84 27 in in IN blog-dshr-org-7999 84 28 - - HYPH blog-dshr-org-7999 84 29 the the DT blog-dshr-org-7999 84 30 - - HYPH blog-dshr-org-7999 84 31 middle middle JJ blog-dshr-org-7999 84 32 attacks attack NNS blog-dshr-org-7999 84 33 . . . blog-dshr-org-7999 85 1 Certificate Certificate NNP blog-dshr-org-7999 85 2 Transparency Transparency NNP blog-dshr-org-7999 85 3 helps help VBZ blog-dshr-org-7999 85 4 eliminate eliminate VB blog-dshr-org-7999 85 5 these these DT blog-dshr-org-7999 85 6 flaws flaw NNS blog-dshr-org-7999 85 7 by by IN blog-dshr-org-7999 85 8 providing provide VBG blog-dshr-org-7999 85 9 an an DT blog-dshr-org-7999 85 10 open open JJ blog-dshr-org-7999 85 11 framework framework NN blog-dshr-org-7999 85 12 for for IN blog-dshr-org-7999 85 13 monitoring monitoring NN blog-dshr-org-7999 85 14 and and CC blog-dshr-org-7999 85 15 auditing audit VBG blog-dshr-org-7999 85 16 SSL SSL NNP blog-dshr-org-7999 85 17 certificates certificate NNS blog-dshr-org-7999 85 18 in in IN blog-dshr-org-7999 85 19 nearly nearly RB blog-dshr-org-7999 85 20 real real JJ blog-dshr-org-7999 85 21 time time NN blog-dshr-org-7999 85 22 . . . blog-dshr-org-7999 86 1 Specifically specifically RB blog-dshr-org-7999 86 2 , , , blog-dshr-org-7999 86 3 Certificate Certificate NNP blog-dshr-org-7999 86 4 Transparency Transparency NNP blog-dshr-org-7999 86 5 makes make VBZ blog-dshr-org-7999 86 6 it -PRON- PRP blog-dshr-org-7999 86 7 possible possible JJ blog-dshr-org-7999 86 8 to to TO blog-dshr-org-7999 86 9 detect detect VB blog-dshr-org-7999 86 10 SSL SSL NNP blog-dshr-org-7999 86 11 certificates certificate NNS blog-dshr-org-7999 86 12 that that WDT blog-dshr-org-7999 86 13 have have VBP blog-dshr-org-7999 86 14 been be VBN blog-dshr-org-7999 86 15 mistakenly mistakenly RB blog-dshr-org-7999 86 16 issued issue VBN blog-dshr-org-7999 86 17 by by IN blog-dshr-org-7999 86 18 a a DT blog-dshr-org-7999 86 19 certificate certificate NN blog-dshr-org-7999 86 20 authority authority NN blog-dshr-org-7999 86 21 or or CC blog-dshr-org-7999 86 22 maliciously maliciously RB blog-dshr-org-7999 86 23 acquired acquire VBN blog-dshr-org-7999 86 24 from from IN blog-dshr-org-7999 86 25 an an DT blog-dshr-org-7999 86 26 otherwise otherwise RB blog-dshr-org-7999 86 27 unimpeachable unimpeachable JJ blog-dshr-org-7999 86 28 certificate certificate NN blog-dshr-org-7999 86 29 authority authority NN blog-dshr-org-7999 86 30 . . . blog-dshr-org-7999 87 1 It -PRON- PRP blog-dshr-org-7999 87 2 also also RB blog-dshr-org-7999 87 3 makes make VBZ blog-dshr-org-7999 87 4 it -PRON- PRP blog-dshr-org-7999 87 5 possible possible JJ blog-dshr-org-7999 87 6 to to TO blog-dshr-org-7999 87 7 identify identify VB blog-dshr-org-7999 87 8 certificate certificate NN blog-dshr-org-7999 87 9 authorities authority NNS blog-dshr-org-7999 87 10 that that WDT blog-dshr-org-7999 87 11 have have VBP blog-dshr-org-7999 87 12 gone go VBN blog-dshr-org-7999 87 13 rogue rogue JJ blog-dshr-org-7999 87 14 and and CC blog-dshr-org-7999 87 15 are be VBP blog-dshr-org-7999 87 16 maliciously maliciously RB blog-dshr-org-7999 87 17 issuing issue VBG blog-dshr-org-7999 87 18 certificates certificate NNS blog-dshr-org-7999 87 19 . . . blog-dshr-org-7999 88 1 The the DT blog-dshr-org-7999 88 2 basic basic JJ blog-dshr-org-7999 88 3 idea idea NN blog-dshr-org-7999 88 4 is be VBZ blog-dshr-org-7999 88 5 to to TO blog-dshr-org-7999 88 6 accompany accompany VB blog-dshr-org-7999 88 7 the the DT blog-dshr-org-7999 88 8 certificate certificate NN blog-dshr-org-7999 88 9 with with IN blog-dshr-org-7999 88 10 a a DT blog-dshr-org-7999 88 11 hash hash NN blog-dshr-org-7999 88 12 of of IN blog-dshr-org-7999 88 13 the the DT blog-dshr-org-7999 88 14 certificate certificate NN blog-dshr-org-7999 88 15 signed sign VBN blog-dshr-org-7999 88 16 by by IN blog-dshr-org-7999 88 17 a a DT blog-dshr-org-7999 88 18 trusted trust VBN blog-dshr-org-7999 88 19 third third JJ blog-dshr-org-7999 88 20 party party NN blog-dshr-org-7999 88 21 , , , blog-dshr-org-7999 88 22 attesting attest VBG blog-dshr-org-7999 88 23 that that IN blog-dshr-org-7999 88 24 the the DT blog-dshr-org-7999 88 25 certificate certificate NN blog-dshr-org-7999 88 26 holder holder NN blog-dshr-org-7999 88 27 told tell VBD blog-dshr-org-7999 88 28 the the DT blog-dshr-org-7999 88 29 third third JJ blog-dshr-org-7999 88 30 party party NN blog-dshr-org-7999 88 31 that that WDT blog-dshr-org-7999 88 32 the the DT blog-dshr-org-7999 88 33 certificate certificate NN blog-dshr-org-7999 88 34 with with IN blog-dshr-org-7999 88 35 that that DT blog-dshr-org-7999 88 36 hash hash NN blog-dshr-org-7999 88 37 was be VBD blog-dshr-org-7999 88 38 current current JJ blog-dshr-org-7999 88 39 . . . blog-dshr-org-7999 89 1 Thus thus RB blog-dshr-org-7999 89 2 in in IN blog-dshr-org-7999 89 3 order order NN blog-dshr-org-7999 89 4 to to TO blog-dshr-org-7999 89 5 spoof spoof VB blog-dshr-org-7999 89 6 a a DT blog-dshr-org-7999 89 7 service service NN blog-dshr-org-7999 89 8 , , , blog-dshr-org-7999 89 9 an an DT blog-dshr-org-7999 89 10 attacker attacker NN blog-dshr-org-7999 89 11 would would MD blog-dshr-org-7999 89 12 have have VB blog-dshr-org-7999 89 13 to to TO blog-dshr-org-7999 89 14 both both DT blog-dshr-org-7999 89 15 obtain obtain VB blog-dshr-org-7999 89 16 a a DT blog-dshr-org-7999 89 17 fraudulent fraudulent JJ blog-dshr-org-7999 89 18 certificate certificate NN blog-dshr-org-7999 89 19 from from IN blog-dshr-org-7999 89 20 a a DT blog-dshr-org-7999 89 21 CA CA NNP blog-dshr-org-7999 89 22 , , , blog-dshr-org-7999 89 23 and and CC blog-dshr-org-7999 89 24 somehow somehow RB blog-dshr-org-7999 89 25 persuade persuade VB blog-dshr-org-7999 89 26 the the DT blog-dshr-org-7999 89 27 third third JJ blog-dshr-org-7999 89 28 party party NNP blog-dshr-org-7999 89 29 to to TO blog-dshr-org-7999 89 30 sign sign VB blog-dshr-org-7999 89 31 a a DT blog-dshr-org-7999 89 32 statement statement NN blog-dshr-org-7999 89 33 that that IN blog-dshr-org-7999 89 34 the the DT blog-dshr-org-7999 89 35 service service NN blog-dshr-org-7999 89 36 had have VBD blog-dshr-org-7999 89 37 told tell VBD blog-dshr-org-7999 89 38 them -PRON- PRP blog-dshr-org-7999 89 39 the the DT blog-dshr-org-7999 89 40 fraudulent fraudulent JJ blog-dshr-org-7999 89 41 certificate certificate NN blog-dshr-org-7999 89 42 was be VBD blog-dshr-org-7999 89 43 current current JJ blog-dshr-org-7999 89 44 . . . blog-dshr-org-7999 90 1 Clearly clearly RB blog-dshr-org-7999 90 2 this this DT blog-dshr-org-7999 90 3 is be VBZ blog-dshr-org-7999 90 4 : : : blog-dshr-org-7999 90 5 more more RBR blog-dshr-org-7999 90 6 secure secure JJ blog-dshr-org-7999 90 7 than than IN blog-dshr-org-7999 90 8 the the DT blog-dshr-org-7999 90 9 current current JJ blog-dshr-org-7999 90 10 situation situation NN blog-dshr-org-7999 90 11 , , , blog-dshr-org-7999 90 12 which which WDT blog-dshr-org-7999 90 13 requires require VBZ blog-dshr-org-7999 90 14 only only RB blog-dshr-org-7999 90 15 compromising compromise VBG blog-dshr-org-7999 90 16 a a DT blog-dshr-org-7999 90 17 CA CA NNP blog-dshr-org-7999 90 18 , , , blog-dshr-org-7999 90 19 and and CC blog-dshr-org-7999 90 20 : : : blog-dshr-org-7999 90 21 more more RBR blog-dshr-org-7999 90 22 effective effective JJ blog-dshr-org-7999 90 23 than than IN blog-dshr-org-7999 90 24 client client NN blog-dshr-org-7999 90 25 - - HYPH blog-dshr-org-7999 90 26 only only JJ blog-dshr-org-7999 90 27 approaches approach NNS blog-dshr-org-7999 90 28 , , , blog-dshr-org-7999 90 29 which which WDT blog-dshr-org-7999 90 30 can can MD blog-dshr-org-7999 90 31 detect detect VB blog-dshr-org-7999 90 32 that that IN blog-dshr-org-7999 90 33 a a DT blog-dshr-org-7999 90 34 certificate certificate NN blog-dshr-org-7999 90 35 has have VBZ blog-dshr-org-7999 90 36 changed change VBN blog-dshr-org-7999 90 37 but but CC blog-dshr-org-7999 90 38 not not RB blog-dshr-org-7999 90 39 whether whether IN blog-dshr-org-7999 90 40 the the DT blog-dshr-org-7999 90 41 change change NN blog-dshr-org-7999 90 42 was be VBD blog-dshr-org-7999 90 43 authorized authorize VBN blog-dshr-org-7999 90 44 . . . blog-dshr-org-7999 91 1 CT CT NNP blog-dshr-org-7999 91 2 also also RB blog-dshr-org-7999 91 3 requires require VBZ blog-dshr-org-7999 91 4 participation participation NN blog-dshr-org-7999 91 5 from from IN blog-dshr-org-7999 91 6 browser browser NN blog-dshr-org-7999 91 7 manufacturers manufacturer NNS blog-dshr-org-7999 91 8 : : . blog-dshr-org-7999 91 9 In in IN blog-dshr-org-7999 91 10 order order NN blog-dshr-org-7999 91 11 to to TO blog-dshr-org-7999 91 12 improve improve VB blog-dshr-org-7999 91 13 the the DT blog-dshr-org-7999 91 14 security security NN blog-dshr-org-7999 91 15 of of IN blog-dshr-org-7999 91 16 Extended extended JJ blog-dshr-org-7999 91 17 Validation Validation NNP blog-dshr-org-7999 91 18 ( ( -LRB- blog-dshr-org-7999 91 19 EV EV NNP blog-dshr-org-7999 91 20 ) ) -RRB- blog-dshr-org-7999 91 21 certificates certificate NNS blog-dshr-org-7999 91 22 , , , blog-dshr-org-7999 91 23 Google Google NNP blog-dshr-org-7999 91 24 Chrome Chrome NNP blog-dshr-org-7999 91 25 requires require VBZ blog-dshr-org-7999 91 26 Certificate Certificate NNP blog-dshr-org-7999 91 27 Transparency Transparency NNP blog-dshr-org-7999 91 28 ( ( -LRB- blog-dshr-org-7999 91 29 CT CT NNP blog-dshr-org-7999 91 30 ) ) -RRB- blog-dshr-org-7999 91 31 compliance compliance NN blog-dshr-org-7999 91 32 for for IN blog-dshr-org-7999 91 33 all all DT blog-dshr-org-7999 91 34 EV EV NNP blog-dshr-org-7999 91 35 certificates certificate NNS blog-dshr-org-7999 91 36 issued issue VBN blog-dshr-org-7999 91 37 after after IN blog-dshr-org-7999 91 38 1 1 CD blog-dshr-org-7999 91 39 Jan Jan NNP blog-dshr-org-7999 91 40 2015 2015 CD blog-dshr-org-7999 91 41 . . . blog-dshr-org-7999 92 1 Clients client NNS blog-dshr-org-7999 92 2 now now RB blog-dshr-org-7999 92 3 need need VBP blog-dshr-org-7999 92 4 two two CD blog-dshr-org-7999 92 5 lists list NNS blog-dshr-org-7999 92 6 of of IN blog-dshr-org-7999 92 7 trusted trust VBN blog-dshr-org-7999 92 8 third third JJ blog-dshr-org-7999 92 9 parties party NNS blog-dshr-org-7999 92 10 , , , blog-dshr-org-7999 92 11 the the DT blog-dshr-org-7999 92 12 CAs ca NNS blog-dshr-org-7999 92 13 and and CC blog-dshr-org-7999 92 14 the the DT blog-dshr-org-7999 92 15 sources source NNS blog-dshr-org-7999 92 16 of of IN blog-dshr-org-7999 92 17 CT CT NNP blog-dshr-org-7999 92 18 attestations attestation NNS blog-dshr-org-7999 92 19 . . . blog-dshr-org-7999 93 1 The the DT blog-dshr-org-7999 93 2 need need NN blog-dshr-org-7999 93 3 for for IN blog-dshr-org-7999 93 4 these these DT blog-dshr-org-7999 93 5 trusted trust VBN blog-dshr-org-7999 93 6 third third JJ blog-dshr-org-7999 93 7 parties party NNS blog-dshr-org-7999 93 8 is be VBZ blog-dshr-org-7999 93 9 where where WRB blog-dshr-org-7999 93 10 the the DT blog-dshr-org-7999 93 11 blockchain blockchain JJ blog-dshr-org-7999 93 12 enthusiasts enthusiast NNS blog-dshr-org-7999 93 13 would would MD blog-dshr-org-7999 93 14 jump jump VB blog-dshr-org-7999 93 15 in in RP blog-dshr-org-7999 93 16 and and CC blog-dshr-org-7999 93 17 claim claim NN blog-dshr-org-7999 93 18 ( ( -LRB- blog-dshr-org-7999 93 19 falsely falsely RB blog-dshr-org-7999 93 20 ) ) -RRB- blog-dshr-org-7999 93 21 that that IN blog-dshr-org-7999 93 22 using use VBG blog-dshr-org-7999 93 23 a a DT blog-dshr-org-7999 93 24 blockchain blockchain NN blog-dshr-org-7999 93 25 would would MD blog-dshr-org-7999 93 26 eliminate eliminate VB blog-dshr-org-7999 93 27 the the DT blog-dshr-org-7999 93 28 need need NN blog-dshr-org-7999 93 29 for for IN blog-dshr-org-7999 93 30 trust trust NN blog-dshr-org-7999 93 31 . . . blog-dshr-org-7999 94 1 But but CC blog-dshr-org-7999 94 2 CT CT NNP blog-dshr-org-7999 94 3 has have VBZ blog-dshr-org-7999 94 4 a a DT blog-dshr-org-7999 94 5 much much RB blog-dshr-org-7999 94 6 more more RBR blog-dshr-org-7999 94 7 sophisticated sophisticated JJ blog-dshr-org-7999 94 8 approach approach NN blog-dshr-org-7999 94 9 , , , blog-dshr-org-7999 94 10 Ronald Ronald NNP blog-dshr-org-7999 94 11 Reagan Reagan NNP blog-dshr-org-7999 94 12 's 's POS blog-dshr-org-7999 94 13 " " `` blog-dshr-org-7999 94 14 Trust Trust NNP blog-dshr-org-7999 94 15 , , , blog-dshr-org-7999 94 16 but but CC blog-dshr-org-7999 94 17 Verify Verify NNP blog-dshr-org-7999 94 18 " " '' blog-dshr-org-7999 94 19 . . . blog-dshr-org-7999 95 1 In in IN blog-dshr-org-7999 95 2 the the DT blog-dshr-org-7999 95 3 real real JJ blog-dshr-org-7999 95 4 world world NN blog-dshr-org-7999 95 5 it -PRON- PRP blog-dshr-org-7999 95 6 is be VBZ blog-dshr-org-7999 95 7 n't not RB blog-dshr-org-7999 95 8 feasible feasible JJ blog-dshr-org-7999 95 9 to to TO blog-dshr-org-7999 95 10 solve solve VB blog-dshr-org-7999 95 11 the the DT blog-dshr-org-7999 95 12 problem problem NN blog-dshr-org-7999 95 13 of of IN blog-dshr-org-7999 95 14 untrustworthy untrustworthy JJ blog-dshr-org-7999 95 15 CAs CAs NNP blog-dshr-org-7999 95 16 by by IN blog-dshr-org-7999 95 17 eliminating eliminate VBG blog-dshr-org-7999 95 18 the the DT blog-dshr-org-7999 95 19 need need NN blog-dshr-org-7999 95 20 for for IN blog-dshr-org-7999 95 21 trust trust NN blog-dshr-org-7999 95 22 . . . blog-dshr-org-7999 96 1 CT CT NNP blog-dshr-org-7999 96 2 's 's POS blog-dshr-org-7999 96 3 approach approach NN blog-dshr-org-7999 96 4 instead instead RB blog-dshr-org-7999 96 5 is be VBZ blog-dshr-org-7999 96 6 to to TO blog-dshr-org-7999 96 7 provide provide VB blog-dshr-org-7999 96 8 a a DT blog-dshr-org-7999 96 9 mechanism mechanism NN blog-dshr-org-7999 96 10 by by IN blog-dshr-org-7999 96 11 which which WDT blog-dshr-org-7999 96 12 breaches breach NNS blog-dshr-org-7999 96 13 of of IN blog-dshr-org-7999 96 14 trust trust NN blog-dshr-org-7999 96 15 , , , blog-dshr-org-7999 96 16 both both CC blog-dshr-org-7999 96 17 by by IN blog-dshr-org-7999 96 18 the the DT blog-dshr-org-7999 96 19 CAs ca NNS blog-dshr-org-7999 96 20 and and CC blog-dshr-org-7999 96 21 by by IN blog-dshr-org-7999 96 22 the the DT blog-dshr-org-7999 96 23 attestors attestor NNS blog-dshr-org-7999 96 24 , , , blog-dshr-org-7999 96 25 can can MD blog-dshr-org-7999 96 26 be be VB blog-dshr-org-7999 96 27 rapidly rapidly RB blog-dshr-org-7999 96 28 and and CC blog-dshr-org-7999 96 29 unambiguously unambiguously RB blog-dshr-org-7999 96 30 detected detect VBN blog-dshr-org-7999 96 31 . . . blog-dshr-org-7999 97 1 The the DT blog-dshr-org-7999 97 2 CT CT NNP blog-dshr-org-7999 97 3 team team NN blog-dshr-org-7999 97 4 write write VBP blog-dshr-org-7999 97 5 : : : blog-dshr-org-7999 97 6 One one CD blog-dshr-org-7999 97 7 of of IN blog-dshr-org-7999 97 8 the the DT blog-dshr-org-7999 97 9 problems problem NNS blog-dshr-org-7999 97 10 is be VBZ blog-dshr-org-7999 97 11 that that IN blog-dshr-org-7999 97 12 there there EX blog-dshr-org-7999 97 13 is be VBZ blog-dshr-org-7999 97 14 currently currently RB blog-dshr-org-7999 97 15 no no DT blog-dshr-org-7999 97 16 easy easy JJ blog-dshr-org-7999 97 17 or or CC blog-dshr-org-7999 97 18 effective effective JJ blog-dshr-org-7999 97 19 way way NN blog-dshr-org-7999 97 20 to to TO blog-dshr-org-7999 97 21 audit audit VB blog-dshr-org-7999 97 22 or or CC blog-dshr-org-7999 97 23 monitor monitor VB blog-dshr-org-7999 97 24 SSL SSL NNP blog-dshr-org-7999 97 25 certificates certificate NNS blog-dshr-org-7999 97 26 in in IN blog-dshr-org-7999 97 27 real real JJ blog-dshr-org-7999 97 28 time time NN blog-dshr-org-7999 97 29 , , , blog-dshr-org-7999 97 30 so so CC blog-dshr-org-7999 97 31 when when WRB blog-dshr-org-7999 97 32 these these DT blog-dshr-org-7999 97 33 missteps misstep NNS blog-dshr-org-7999 97 34 happen happen VBP blog-dshr-org-7999 97 35 ( ( -LRB- blog-dshr-org-7999 97 36 malicious malicious JJ blog-dshr-org-7999 97 37 or or CC blog-dshr-org-7999 97 38 otherwise otherwise RB blog-dshr-org-7999 97 39 ) ) -RRB- blog-dshr-org-7999 97 40 , , , blog-dshr-org-7999 97 41 the the DT blog-dshr-org-7999 97 42 suspect suspect JJ blog-dshr-org-7999 97 43 certificates certificate NNS blog-dshr-org-7999 97 44 are be VBP blog-dshr-org-7999 97 45 n’t not RB blog-dshr-org-7999 97 46 usually usually RB blog-dshr-org-7999 97 47 detected detect VBN blog-dshr-org-7999 97 48 and and CC blog-dshr-org-7999 97 49 revoked revoke VBN blog-dshr-org-7999 97 50 for for IN blog-dshr-org-7999 97 51 weeks week NNS blog-dshr-org-7999 97 52 or or CC blog-dshr-org-7999 97 53 even even RB blog-dshr-org-7999 97 54 months month NNS blog-dshr-org-7999 97 55 . . . blog-dshr-org-7999 98 1 Source source NN blog-dshr-org-7999 98 2 I -PRON- PRP blog-dshr-org-7999 98 3 do do VBP blog-dshr-org-7999 98 4 n't not RB blog-dshr-org-7999 98 5 want want VB blog-dshr-org-7999 98 6 to to TO blog-dshr-org-7999 98 7 go go VB blog-dshr-org-7999 98 8 into into IN blog-dshr-org-7999 98 9 too too RB blog-dshr-org-7999 98 10 much much JJ blog-dshr-org-7999 98 11 detail detail NN blog-dshr-org-7999 98 12 , , , blog-dshr-org-7999 98 13 for for IN blog-dshr-org-7999 98 14 that that DT blog-dshr-org-7999 98 15 you -PRON- PRP blog-dshr-org-7999 98 16 can can MD blog-dshr-org-7999 98 17 read read VB blog-dshr-org-7999 98 18 RFC6962 RFC6962 NNP blog-dshr-org-7999 98 19 , , , blog-dshr-org-7999 98 20 but but CC blog-dshr-org-7999 98 21 here here RB blog-dshr-org-7999 98 22 is be VBZ blog-dshr-org-7999 98 23 an an DT blog-dshr-org-7999 98 24 overview overview NN blog-dshr-org-7999 98 25 of of IN blog-dshr-org-7999 98 26 how how WRB blog-dshr-org-7999 98 27 CT CT NNP blog-dshr-org-7999 98 28 works work VBZ blog-dshr-org-7999 98 29 to to TO blog-dshr-org-7999 98 30 detect detect VB blog-dshr-org-7999 98 31 breaches breach NNS blog-dshr-org-7999 98 32 of of IN blog-dshr-org-7999 98 33 trust trust NN blog-dshr-org-7999 98 34 . . . blog-dshr-org-7999 99 1 The the DT blog-dshr-org-7999 99 2 system system NN blog-dshr-org-7999 99 3 has have VBZ blog-dshr-org-7999 99 4 the the DT blog-dshr-org-7999 99 5 following follow VBG blog-dshr-org-7999 99 6 components component NNS blog-dshr-org-7999 99 7 : : : blog-dshr-org-7999 99 8 Logs Logs NNP blog-dshr-org-7999 99 9 , , , blog-dshr-org-7999 99 10 to to IN blog-dshr-org-7999 99 11 which which WDT blog-dshr-org-7999 99 12 CAs ca NNS blog-dshr-org-7999 99 13 report report VBP blog-dshr-org-7999 99 14 their -PRON- PRP$ blog-dshr-org-7999 99 15 current current JJ blog-dshr-org-7999 99 16 certificates certificate NNS blog-dshr-org-7999 99 17 , , , blog-dshr-org-7999 99 18 and and CC blog-dshr-org-7999 99 19 from from IN blog-dshr-org-7999 99 20 which which WDT blog-dshr-org-7999 99 21 they -PRON- PRP blog-dshr-org-7999 99 22 obtain obtain VBP blog-dshr-org-7999 99 23 attestations attestation NNS blog-dshr-org-7999 99 24 , , , blog-dshr-org-7999 99 25 called call VBD blog-dshr-org-7999 99 26 Signed Signed NNP blog-dshr-org-7999 99 27 Certificate Certificate NNP blog-dshr-org-7999 99 28 Timestamps Timestamps NNPS blog-dshr-org-7999 99 29 ( ( -LRB- blog-dshr-org-7999 99 30 SCTs SCTs NNP blog-dshr-org-7999 99 31 ) ) -RRB- blog-dshr-org-7999 99 32 that that IN blog-dshr-org-7999 99 33 owners owner NNS blog-dshr-org-7999 99 34 can can MD blog-dshr-org-7999 99 35 attach attach VB blog-dshr-org-7999 99 36 to to IN blog-dshr-org-7999 99 37 their -PRON- PRP$ blog-dshr-org-7999 99 38 certificates certificate NNS blog-dshr-org-7999 99 39 . . . blog-dshr-org-7999 100 1 Clients client NNS blog-dshr-org-7999 100 2 can can MD blog-dshr-org-7999 100 3 verify verify VB blog-dshr-org-7999 100 4 the the DT blog-dshr-org-7999 100 5 signature signature NN blog-dshr-org-7999 100 6 on on IN blog-dshr-org-7999 100 7 the the DT blog-dshr-org-7999 100 8 SCT SCT NNP blog-dshr-org-7999 100 9 , , , blog-dshr-org-7999 100 10 then then RB blog-dshr-org-7999 100 11 verify verify VBP blog-dshr-org-7999 100 12 that that IN blog-dshr-org-7999 100 13 the the DT blog-dshr-org-7999 100 14 hash hash NN blog-dshr-org-7999 100 15 it -PRON- PRP blog-dshr-org-7999 100 16 contains contain VBZ blog-dshr-org-7999 100 17 matches match NNS blog-dshr-org-7999 100 18 the the DT blog-dshr-org-7999 100 19 certificate certificate NN blog-dshr-org-7999 100 20 . . . blog-dshr-org-7999 101 1 If if IN blog-dshr-org-7999 101 2 it -PRON- PRP blog-dshr-org-7999 101 3 does do VBZ blog-dshr-org-7999 101 4 , , , blog-dshr-org-7999 101 5 the the DT blog-dshr-org-7999 101 6 certificate certificate NN blog-dshr-org-7999 101 7 was be VBD blog-dshr-org-7999 101 8 the the DT blog-dshr-org-7999 101 9 one one NN blog-dshr-org-7999 101 10 that that WDT blog-dshr-org-7999 101 11 the the DT blog-dshr-org-7999 101 12 CA CA NNP blog-dshr-org-7999 101 13 reported report VBD blog-dshr-org-7999 101 14 to to IN blog-dshr-org-7999 101 15 the the DT blog-dshr-org-7999 101 16 log log NN blog-dshr-org-7999 101 17 , , , blog-dshr-org-7999 101 18 and and CC blog-dshr-org-7999 101 19 the the DT blog-dshr-org-7999 101 20 owner owner NN blog-dshr-org-7999 101 21 validated validate VBD blog-dshr-org-7999 101 22 . . . blog-dshr-org-7999 102 1 It -PRON- PRP blog-dshr-org-7999 102 2 is be VBZ blog-dshr-org-7999 102 3 envisaged envisage VBN blog-dshr-org-7999 102 4 that that IN blog-dshr-org-7999 102 5 there there EX blog-dshr-org-7999 102 6 will will MD blog-dshr-org-7999 102 7 be be VB blog-dshr-org-7999 102 8 tens ten NNS blog-dshr-org-7999 102 9 but but CC blog-dshr-org-7999 102 10 not not RB blog-dshr-org-7999 102 11 thousands thousand NNS blog-dshr-org-7999 102 12 of of IN blog-dshr-org-7999 102 13 logs log NNS blog-dshr-org-7999 102 14 ; ; : blog-dshr-org-7999 102 15 Chrome Chrome NNP blog-dshr-org-7999 102 16 currently currently RB blog-dshr-org-7999 102 17 trusts trust VBZ blog-dshr-org-7999 102 18 26 26 CD blog-dshr-org-7999 102 19 logs log NNS blog-dshr-org-7999 102 20 . . . blog-dshr-org-7999 103 1 Each each DT blog-dshr-org-7999 103 2 log log NN blog-dshr-org-7999 103 3 maintains maintain VBZ blog-dshr-org-7999 103 4 a a DT blog-dshr-org-7999 103 5 Merkle Merkle NNP blog-dshr-org-7999 103 6 tree tree NN blog-dshr-org-7999 103 7 data datum NNS blog-dshr-org-7999 103 8 structure structure NN blog-dshr-org-7999 103 9 of of IN blog-dshr-org-7999 103 10 the the DT blog-dshr-org-7999 103 11 certificates certificate NNS blog-dshr-org-7999 103 12 for for IN blog-dshr-org-7999 103 13 which which WDT blog-dshr-org-7999 103 14 it -PRON- PRP blog-dshr-org-7999 103 15 has have VBZ blog-dshr-org-7999 103 16 issued issue VBN blog-dshr-org-7999 103 17 SCTs sct NNS blog-dshr-org-7999 103 18 . . . blog-dshr-org-7999 104 1 Monitors monitor NNS blog-dshr-org-7999 104 2 , , , blog-dshr-org-7999 104 3 which which WDT blog-dshr-org-7999 104 4 periodically periodically RB blog-dshr-org-7999 104 5 download download VBP blog-dshr-org-7999 104 6 all all RB blog-dshr-org-7999 104 7 newly newly RB blog-dshr-org-7999 104 8 added add VBN blog-dshr-org-7999 104 9 entries entry NNS blog-dshr-org-7999 104 10 from from IN blog-dshr-org-7999 104 11 the the DT blog-dshr-org-7999 104 12 logs log NNS blog-dshr-org-7999 104 13 that that WDT blog-dshr-org-7999 104 14 they -PRON- PRP blog-dshr-org-7999 104 15 monitor monitor VBP blog-dshr-org-7999 104 16 , , , blog-dshr-org-7999 104 17 verify verify VBP blog-dshr-org-7999 104 18 that that IN blog-dshr-org-7999 104 19 they -PRON- PRP blog-dshr-org-7999 104 20 have have VBP blog-dshr-org-7999 104 21 in in IN blog-dshr-org-7999 104 22 fact fact NN blog-dshr-org-7999 104 23 been be VBN blog-dshr-org-7999 104 24 added add VBN blog-dshr-org-7999 104 25 to to IN blog-dshr-org-7999 104 26 the the DT blog-dshr-org-7999 104 27 log log NN blog-dshr-org-7999 104 28 , , , blog-dshr-org-7999 104 29 and and CC blog-dshr-org-7999 104 30 perform perform VB blog-dshr-org-7999 104 31 a a DT blog-dshr-org-7999 104 32 series series NN blog-dshr-org-7999 104 33 of of IN blog-dshr-org-7999 104 34 validity validity NN blog-dshr-org-7999 104 35 checks check NNS blog-dshr-org-7999 104 36 on on IN blog-dshr-org-7999 104 37 them -PRON- PRP blog-dshr-org-7999 104 38 . . . blog-dshr-org-7999 105 1 They -PRON- PRP blog-dshr-org-7999 105 2 also also RB blog-dshr-org-7999 105 3 thus thus RB blog-dshr-org-7999 105 4 act act VBP blog-dshr-org-7999 105 5 as as IN blog-dshr-org-7999 105 6 backups backup NNS blog-dshr-org-7999 105 7 for for IN blog-dshr-org-7999 105 8 the the DT blog-dshr-org-7999 105 9 logs log NNS blog-dshr-org-7999 105 10 they -PRON- PRP blog-dshr-org-7999 105 11 monitor monitor VBP blog-dshr-org-7999 105 12 . . . blog-dshr-org-7999 106 1 Auditors auditor NNS blog-dshr-org-7999 106 2 , , , blog-dshr-org-7999 106 3 which which WDT blog-dshr-org-7999 106 4 use use VBP blog-dshr-org-7999 106 5 the the DT blog-dshr-org-7999 106 6 Merkle Merkle NNP blog-dshr-org-7999 106 7 tree tree NN blog-dshr-org-7999 106 8 of of IN blog-dshr-org-7999 106 9 the the DT blog-dshr-org-7999 106 10 logs log NNS blog-dshr-org-7999 106 11 they -PRON- PRP blog-dshr-org-7999 106 12 audit audit VBP blog-dshr-org-7999 106 13 to to TO blog-dshr-org-7999 106 14 verify verify VB blog-dshr-org-7999 106 15 that that IN blog-dshr-org-7999 106 16 certificates certificate NNS blog-dshr-org-7999 106 17 have have VBP blog-dshr-org-7999 106 18 been be VBN blog-dshr-org-7999 106 19 correctly correctly RB blog-dshr-org-7999 106 20 appended append VBN blog-dshr-org-7999 106 21 to to IN blog-dshr-org-7999 106 22 the the DT blog-dshr-org-7999 106 23 log log NN blog-dshr-org-7999 106 24 , , , blog-dshr-org-7999 106 25 and and CC blog-dshr-org-7999 106 26 that that IN blog-dshr-org-7999 106 27 no no DT blog-dshr-org-7999 106 28 retroactive retroactive JJ blog-dshr-org-7999 106 29 insertions insertion NNS blog-dshr-org-7999 106 30 , , , blog-dshr-org-7999 106 31 deletions deletion NNS blog-dshr-org-7999 106 32 or or CC blog-dshr-org-7999 106 33 modifications modification NNS blog-dshr-org-7999 106 34 of of IN blog-dshr-org-7999 106 35 the the DT blog-dshr-org-7999 106 36 certificates certificate NNS blog-dshr-org-7999 106 37 in in IN blog-dshr-org-7999 106 38 the the DT blog-dshr-org-7999 106 39 log log NN blog-dshr-org-7999 106 40 have have VBP blog-dshr-org-7999 106 41 taken take VBN blog-dshr-org-7999 106 42 place place NN blog-dshr-org-7999 106 43 . . . blog-dshr-org-7999 107 1 Clients client NNS blog-dshr-org-7999 107 2 can can MD blog-dshr-org-7999 107 3 use use VB blog-dshr-org-7999 107 4 auditors auditor NNS blog-dshr-org-7999 107 5 to to TO blog-dshr-org-7999 107 6 determine determine VB blog-dshr-org-7999 107 7 whether whether IN blog-dshr-org-7999 107 8 a a DT blog-dshr-org-7999 107 9 certificate certificate NN blog-dshr-org-7999 107 10 appears appear VBZ blog-dshr-org-7999 107 11 in in IN blog-dshr-org-7999 107 12 a a DT blog-dshr-org-7999 107 13 log log NN blog-dshr-org-7999 107 14 . . . blog-dshr-org-7999 108 1 If if IN blog-dshr-org-7999 108 2 it -PRON- PRP blog-dshr-org-7999 108 3 does do VBZ blog-dshr-org-7999 108 4 n't not RB blog-dshr-org-7999 108 5 , , , blog-dshr-org-7999 108 6 they -PRON- PRP blog-dshr-org-7999 108 7 can can MD blog-dshr-org-7999 108 8 use use VB blog-dshr-org-7999 108 9 the the DT blog-dshr-org-7999 108 10 SCT SCT NNP blog-dshr-org-7999 108 11 to to TO blog-dshr-org-7999 108 12 prove prove VB blog-dshr-org-7999 108 13 that that IN blog-dshr-org-7999 108 14 the the DT blog-dshr-org-7999 108 15 log log NN blog-dshr-org-7999 108 16 misbehaved misbehave VBD blog-dshr-org-7999 108 17 . . . blog-dshr-org-7999 109 1 In in IN blog-dshr-org-7999 109 2 this this DT blog-dshr-org-7999 109 3 way way NN blog-dshr-org-7999 109 4 , , , blog-dshr-org-7999 109 5 auditors auditor NNS blog-dshr-org-7999 109 6 , , , blog-dshr-org-7999 109 7 monitors monitor NNS blog-dshr-org-7999 109 8 and and CC blog-dshr-org-7999 109 9 clients client NNS blog-dshr-org-7999 109 10 cooperate cooperate VBP blog-dshr-org-7999 109 11 to to TO blog-dshr-org-7999 109 12 verify verify VB blog-dshr-org-7999 109 13 the the DT blog-dshr-org-7999 109 14 correct correct JJ blog-dshr-org-7999 109 15 operation operation NN blog-dshr-org-7999 109 16 of of IN blog-dshr-org-7999 109 17 logs logs NNP blog-dshr-org-7999 109 18 , , , blog-dshr-org-7999 109 19 which which WDT blog-dshr-org-7999 109 20 in in IN blog-dshr-org-7999 109 21 turn turn NN blog-dshr-org-7999 109 22 provides provide VBZ blog-dshr-org-7999 109 23 clients client NNS blog-dshr-org-7999 109 24 with with IN blog-dshr-org-7999 109 25 confidence confidence NN blog-dshr-org-7999 109 26 in in IN blog-dshr-org-7999 109 27 the the DT blog-dshr-org-7999 109 28 [ [ -LRB- blog-dshr-org-7999 109 29 certificate certificate NN blog-dshr-org-7999 109 30 , , , blog-dshr-org-7999 109 31 attestation attestation NN blog-dshr-org-7999 109 32 ] ] -RRB- blog-dshr-org-7999 109 33 pairs pair NNS blog-dshr-org-7999 109 34 they -PRON- PRP blog-dshr-org-7999 109 35 use use VBP blog-dshr-org-7999 109 36 to to TO blog-dshr-org-7999 109 37 secure secure VB blog-dshr-org-7999 109 38 their -PRON- PRP$ blog-dshr-org-7999 109 39 communications communication NNS blog-dshr-org-7999 109 40 . . . blog-dshr-org-7999 110 1 Source source NN blog-dshr-org-7999 110 2 Figure figure NN blog-dshr-org-7999 110 3 3 3 CD blog-dshr-org-7999 110 4 of of IN blog-dshr-org-7999 110 5 How how WRB blog-dshr-org-7999 110 6 Certificate Certificate NNP blog-dshr-org-7999 110 7 Transparency Transparency NNP blog-dshr-org-7999 110 8 Works Works NNP blog-dshr-org-7999 110 9 shows show VBZ blog-dshr-org-7999 110 10 how how WRB blog-dshr-org-7999 110 11 the the DT blog-dshr-org-7999 110 12 team team NN blog-dshr-org-7999 110 13 believes believe VBZ blog-dshr-org-7999 110 14 it -PRON- PRP blog-dshr-org-7999 110 15 would would MD blog-dshr-org-7999 110 16 normally normally RB blog-dshr-org-7999 110 17 be be VB blog-dshr-org-7999 110 18 configured configure VBN blog-dshr-org-7999 110 19 . . . blog-dshr-org-7999 111 1 As as IN blog-dshr-org-7999 111 2 you -PRON- PRP blog-dshr-org-7999 111 3 can can MD blog-dshr-org-7999 111 4 see see VB blog-dshr-org-7999 111 5 , , , blog-dshr-org-7999 111 6 the the DT blog-dshr-org-7999 111 7 monitor monitor NN blog-dshr-org-7999 111 8 is be VBZ blog-dshr-org-7999 111 9 actually actually RB blog-dshr-org-7999 111 10 part part NN blog-dshr-org-7999 111 11 of of IN blog-dshr-org-7999 111 12 the the DT blog-dshr-org-7999 111 13 CA CA NNP blog-dshr-org-7999 111 14 , , , blog-dshr-org-7999 111 15 checking check VBG blog-dshr-org-7999 111 16 at at IN blog-dshr-org-7999 111 17 intervals interval NNS blog-dshr-org-7999 111 18 that that WDT blog-dshr-org-7999 111 19 the the DT blog-dshr-org-7999 111 20 log log NN blog-dshr-org-7999 111 21 contains contain VBZ blog-dshr-org-7999 111 22 only only RB blog-dshr-org-7999 111 23 the the DT blog-dshr-org-7999 111 24 certificates certificate NNS blog-dshr-org-7999 111 25 the the DT blog-dshr-org-7999 111 26 CA CA NNP blog-dshr-org-7999 111 27 sent send VBD blog-dshr-org-7999 111 28 it -PRON- PRP blog-dshr-org-7999 111 29 . . . blog-dshr-org-7999 112 1 The the DT blog-dshr-org-7999 112 2 auditor auditor NN blog-dshr-org-7999 112 3 is be VBZ blog-dshr-org-7999 112 4 part part NN blog-dshr-org-7999 112 5 of of IN blog-dshr-org-7999 112 6 the the DT blog-dshr-org-7999 112 7 client client NN blog-dshr-org-7999 112 8 , , , blog-dshr-org-7999 112 9 checking check VBG blog-dshr-org-7999 112 10 at at IN blog-dshr-org-7999 112 11 intervals interval NNS blog-dshr-org-7999 112 12 that that WDT blog-dshr-org-7999 112 13 the the DT blog-dshr-org-7999 112 14 certificates certificate NNS blog-dshr-org-7999 112 15 in in IN blog-dshr-org-7999 112 16 the the DT blog-dshr-org-7999 112 17 SCTs sct NNS blog-dshr-org-7999 112 18 it -PRON- PRP blog-dshr-org-7999 112 19 receives receive VBZ blog-dshr-org-7999 112 20 from from IN blog-dshr-org-7999 112 21 Web web NN blog-dshr-org-7999 112 22 servers server NNS blog-dshr-org-7999 112 23 are be VBP blog-dshr-org-7999 112 24 correctly correctly RB blog-dshr-org-7999 112 25 stored store VBN blog-dshr-org-7999 112 26 in in IN blog-dshr-org-7999 112 27 the the DT blog-dshr-org-7999 112 28 log log NN blog-dshr-org-7999 112 29 . . . blog-dshr-org-7999 113 1 Although although IN blog-dshr-org-7999 113 2 CT CT NNP blog-dshr-org-7999 113 3 works work NNS blog-dshr-org-7999 113 4 if if IN blog-dshr-org-7999 113 5 certificate certificate NN blog-dshr-org-7999 113 6 owners owner NNS blog-dshr-org-7999 113 7 each each DT blog-dshr-org-7999 113 8 obtain obtain VBP blog-dshr-org-7999 113 9 their -PRON- PRP$ blog-dshr-org-7999 113 10 SCTs sct NNS blog-dshr-org-7999 113 11 from from IN blog-dshr-org-7999 113 12 only only RB blog-dshr-org-7999 113 13 one one CD blog-dshr-org-7999 113 14 log log NN blog-dshr-org-7999 113 15 , , , blog-dshr-org-7999 113 16 RFC6962 RFC6962 NNP blog-dshr-org-7999 113 17 recommends recommend VBZ blog-dshr-org-7999 113 18 that that IN blog-dshr-org-7999 113 19 : : : blog-dshr-org-7999 113 20 TLS TLS NNP blog-dshr-org-7999 113 21 servers server NNS blog-dshr-org-7999 113 22 should should MD blog-dshr-org-7999 113 23 send send VB blog-dshr-org-7999 113 24 SCTs SCTs NNP blog-dshr-org-7999 113 25 from from IN blog-dshr-org-7999 113 26 multiple multiple JJ blog-dshr-org-7999 113 27 logs log NNS blog-dshr-org-7999 113 28 in in IN blog-dshr-org-7999 113 29 case case NN blog-dshr-org-7999 113 30 one one CD blog-dshr-org-7999 113 31 or or CC blog-dshr-org-7999 113 32 more more JJR blog-dshr-org-7999 113 33 logs log NNS blog-dshr-org-7999 113 34 are be VBP blog-dshr-org-7999 113 35 not not RB blog-dshr-org-7999 113 36 acceptable acceptable JJ blog-dshr-org-7999 113 37 to to IN blog-dshr-org-7999 113 38 the the DT blog-dshr-org-7999 113 39 client client NN blog-dshr-org-7999 113 40 ( ( -LRB- blog-dshr-org-7999 113 41 for for IN blog-dshr-org-7999 113 42 example example NN blog-dshr-org-7999 113 43 , , , blog-dshr-org-7999 113 44 if if IN blog-dshr-org-7999 113 45 a a DT blog-dshr-org-7999 113 46 log log NN blog-dshr-org-7999 113 47 has have VBZ blog-dshr-org-7999 113 48 been be VBN blog-dshr-org-7999 113 49 struck strike VBN blog-dshr-org-7999 113 50 off off RP blog-dshr-org-7999 113 51 for for IN blog-dshr-org-7999 113 52 misbehavior misbehavior NN blog-dshr-org-7999 113 53 or or CC blog-dshr-org-7999 113 54 has have VBZ blog-dshr-org-7999 113 55 had have VBN blog-dshr-org-7999 113 56 a a DT blog-dshr-org-7999 113 57 key key JJ blog-dshr-org-7999 113 58 compromise compromise NN blog-dshr-org-7999 113 59 ) ) -RRB- blog-dshr-org-7999 113 60 . . . blog-dshr-org-7999 114 1 In in IN blog-dshr-org-7999 114 2 other other JJ blog-dshr-org-7999 114 3 words word NNS blog-dshr-org-7999 114 4 , , , blog-dshr-org-7999 114 5 each each DT blog-dshr-org-7999 114 6 certificate certificate NN blog-dshr-org-7999 114 7 should should MD blog-dshr-org-7999 114 8 be be VB blog-dshr-org-7999 114 9 submitted submit VBN blog-dshr-org-7999 114 10 to to IN blog-dshr-org-7999 114 11 multiple multiple JJ blog-dshr-org-7999 114 12 logs log NNS blog-dshr-org-7999 114 13 . . . blog-dshr-org-7999 115 1 This this DT blog-dshr-org-7999 115 2 is be VBZ blog-dshr-org-7999 115 3 only only RB blog-dshr-org-7999 115 4 one one CD blog-dshr-org-7999 115 5 of of IN blog-dshr-org-7999 115 6 the the DT blog-dshr-org-7999 115 7 features feature NNS blog-dshr-org-7999 115 8 of of IN blog-dshr-org-7999 115 9 CT CT NNP blog-dshr-org-7999 115 10 that that WDT blog-dshr-org-7999 115 11 are be VBP blog-dshr-org-7999 115 12 important important JJ blog-dshr-org-7999 115 13 for for IN blog-dshr-org-7999 115 14 resilience resilience NN blog-dshr-org-7999 115 15 : : : blog-dshr-org-7999 115 16 Each each DT blog-dshr-org-7999 115 17 log log NN blog-dshr-org-7999 115 18 operates operate VBZ blog-dshr-org-7999 115 19 independently independently RB blog-dshr-org-7999 115 20 . . . blog-dshr-org-7999 116 1 Each each DT blog-dshr-org-7999 116 2 log log NN blog-dshr-org-7999 116 3 gets get VBZ blog-dshr-org-7999 116 4 its -PRON- PRP$ blog-dshr-org-7999 116 5 content content NN blog-dshr-org-7999 116 6 directly directly RB blog-dshr-org-7999 116 7 from from IN blog-dshr-org-7999 116 8 the the DT blog-dshr-org-7999 116 9 CAs ca NNS blog-dshr-org-7999 116 10 , , , blog-dshr-org-7999 116 11 not not RB blog-dshr-org-7999 116 12 via via IN blog-dshr-org-7999 116 13 replication replication NN blog-dshr-org-7999 116 14 from from IN blog-dshr-org-7999 116 15 other other JJ blog-dshr-org-7999 116 16 logs log NNS blog-dshr-org-7999 116 17 . . . blog-dshr-org-7999 117 1 Each each DT blog-dshr-org-7999 117 2 log log NN blog-dshr-org-7999 117 3 contains contain VBZ blog-dshr-org-7999 117 4 a a DT blog-dshr-org-7999 117 5 subset subset NN blog-dshr-org-7999 117 6 of of IN blog-dshr-org-7999 117 7 the the DT blog-dshr-org-7999 117 8 total total JJ blog-dshr-org-7999 117 9 information information NN blog-dshr-org-7999 117 10 content content NN blog-dshr-org-7999 117 11 of of IN blog-dshr-org-7999 117 12 the the DT blog-dshr-org-7999 117 13 system system NN blog-dshr-org-7999 117 14 . . . blog-dshr-org-7999 118 1 There there EX blog-dshr-org-7999 118 2 is be VBZ blog-dshr-org-7999 118 3 no no DT blog-dshr-org-7999 118 4 consensus consensus NN blog-dshr-org-7999 118 5 mechanism mechanism NN blog-dshr-org-7999 118 6 operating operate VBG blog-dshr-org-7999 118 7 between between IN blog-dshr-org-7999 118 8 the the DT blog-dshr-org-7999 118 9 logs log NNS blog-dshr-org-7999 118 10 , , , blog-dshr-org-7999 118 11 so so IN blog-dshr-org-7999 118 12 it -PRON- PRP blog-dshr-org-7999 118 13 can can MD blog-dshr-org-7999 118 14 not not RB blog-dshr-org-7999 118 15 be be VB blog-dshr-org-7999 118 16 abused abuse VBN blog-dshr-org-7999 118 17 by by IN blog-dshr-org-7999 118 18 , , , blog-dshr-org-7999 118 19 for for IN blog-dshr-org-7999 118 20 example example NN blog-dshr-org-7999 118 21 , , , blog-dshr-org-7999 118 22 a a DT blog-dshr-org-7999 118 23 51 51 CD blog-dshr-org-7999 118 24 % % NN blog-dshr-org-7999 118 25 attack attack NN blog-dshr-org-7999 118 26 . . . blog-dshr-org-7999 119 1 Monitoring monitoring NN blog-dshr-org-7999 119 2 and and CC blog-dshr-org-7999 119 3 auditing auditing NN blog-dshr-org-7999 119 4 is be VBZ blog-dshr-org-7999 119 5 asynchronous asynchronous JJ blog-dshr-org-7999 119 6 to to TO blog-dshr-org-7999 119 7 Web web NN blog-dshr-org-7999 119 8 content content NN blog-dshr-org-7999 119 9 delivery delivery NN blog-dshr-org-7999 119 10 , , , blog-dshr-org-7999 119 11 so so RB blog-dshr-org-7999 119 12 denial denial NN blog-dshr-org-7999 119 13 of of IN blog-dshr-org-7999 119 14 service service NN blog-dshr-org-7999 119 15 against against IN blog-dshr-org-7999 119 16 the the DT blog-dshr-org-7999 119 17 monitors monitor NNS blog-dshr-org-7999 119 18 and and CC blog-dshr-org-7999 119 19 auditors auditor NNS blog-dshr-org-7999 119 20 can can MD blog-dshr-org-7999 119 21 not not RB blog-dshr-org-7999 119 22 prevent prevent VB blog-dshr-org-7999 119 23 clients client NNS blog-dshr-org-7999 119 24 obtaining obtain VBG blog-dshr-org-7999 119 25 service service NN blog-dshr-org-7999 119 26 . . . blog-dshr-org-7999 120 1 Sustained sustain VBN blog-dshr-org-7999 120 2 over over IN blog-dshr-org-7999 120 3 long long JJ blog-dshr-org-7999 120 4 periods period NNS blog-dshr-org-7999 120 5 it -PRON- PRP blog-dshr-org-7999 120 6 would would MD blog-dshr-org-7999 120 7 gradually gradually RB blog-dshr-org-7999 120 8 decrease decrease VB blog-dshr-org-7999 120 9 clients client NNS blog-dshr-org-7999 120 10 ' ' POS blog-dshr-org-7999 120 11 confidence confidence NN blog-dshr-org-7999 120 12 in in IN blog-dshr-org-7999 120 13 the the DT blog-dshr-org-7999 120 14 Web web NN blog-dshr-org-7999 120 15 sites site NNS blog-dshr-org-7999 120 16 ' ' POS blog-dshr-org-7999 120 17 certificates certificate NNS blog-dshr-org-7999 120 18 . . . blog-dshr-org-7999 121 1 Looking look VBG blog-dshr-org-7999 121 2 at at IN blog-dshr-org-7999 121 3 the the DT blog-dshr-org-7999 121 4 list list NN blog-dshr-org-7999 121 5 of of IN blog-dshr-org-7999 121 6 logs logs NNP blog-dshr-org-7999 121 7 Chrome Chrome NNP blog-dshr-org-7999 121 8 currently currently RB blog-dshr-org-7999 121 9 trusts trust VBZ blog-dshr-org-7999 121 10 , , , blog-dshr-org-7999 121 11 it -PRON- PRP blog-dshr-org-7999 121 12 is be VBZ blog-dshr-org-7999 121 13 clear clear JJ blog-dshr-org-7999 121 14 that that IN blog-dshr-org-7999 121 15 almost almost RB blog-dshr-org-7999 121 16 all all DT blog-dshr-org-7999 121 17 are be VBP blog-dshr-org-7999 121 18 operated operate VBN blog-dshr-org-7999 121 19 by by IN blog-dshr-org-7999 121 20 CAs ca NNS blog-dshr-org-7999 121 21 themselves -PRON- PRP blog-dshr-org-7999 121 22 . . . blog-dshr-org-7999 122 1 Assuming assume VBG blog-dshr-org-7999 122 2 that that IN blog-dshr-org-7999 122 3 each each DT blog-dshr-org-7999 122 4 monitor monitor NN blog-dshr-org-7999 122 5 at at IN blog-dshr-org-7999 122 6 each each DT blog-dshr-org-7999 122 7 CA CA NNP blog-dshr-org-7999 122 8 is be VBZ blog-dshr-org-7999 122 9 monitoring monitor VBG blog-dshr-org-7999 122 10 some some DT blog-dshr-org-7999 122 11 of of IN blog-dshr-org-7999 122 12 the the DT blog-dshr-org-7999 122 13 other other JJ blog-dshr-org-7999 122 14 logs log NNS blog-dshr-org-7999 122 15 as as RB blog-dshr-org-7999 122 16 well well RB blog-dshr-org-7999 122 17 as as IN blog-dshr-org-7999 122 18 the the DT blog-dshr-org-7999 122 19 one one NN blog-dshr-org-7999 122 20 it -PRON- PRP blog-dshr-org-7999 122 21 operates operate VBZ blog-dshr-org-7999 122 22 , , , blog-dshr-org-7999 122 23 this this DT blog-dshr-org-7999 122 24 does do VBZ blog-dshr-org-7999 122 25 not not RB blog-dshr-org-7999 122 26 represent represent VB blog-dshr-org-7999 122 27 a a DT blog-dshr-org-7999 122 28 threat threat NN blog-dshr-org-7999 122 29 , , , blog-dshr-org-7999 122 30 because because IN blog-dshr-org-7999 122 31 misbehavior misbehavior JJ blog-dshr-org-7999 122 32 by by IN blog-dshr-org-7999 122 33 that that DT blog-dshr-org-7999 122 34 CA CA NNP blog-dshr-org-7999 122 35 would would MD blog-dshr-org-7999 122 36 be be VB blog-dshr-org-7999 122 37 detected detect VBN blog-dshr-org-7999 122 38 by by IN blog-dshr-org-7999 122 39 other other JJ blog-dshr-org-7999 122 40 CAs ca NNS blog-dshr-org-7999 122 41 . . . blog-dshr-org-7999 123 1 A a DT blog-dshr-org-7999 123 2 CA CA NNP blog-dshr-org-7999 123 3 's 's POS blog-dshr-org-7999 123 4 monitor monitor NN blog-dshr-org-7999 123 5 that that WDT blog-dshr-org-7999 123 6 was be VBD blog-dshr-org-7999 123 7 tempted tempt VBN blog-dshr-org-7999 123 8 to to TO blog-dshr-org-7999 123 9 cover cover VB blog-dshr-org-7999 123 10 up up RP blog-dshr-org-7999 123 11 misbehavior misbehavior NN blog-dshr-org-7999 123 12 by by IN blog-dshr-org-7999 123 13 a a DT blog-dshr-org-7999 123 14 different different JJ blog-dshr-org-7999 123 15 CA CA NNP blog-dshr-org-7999 123 16 's 's POS blog-dshr-org-7999 123 17 log log NN blog-dshr-org-7999 123 18 it -PRON- PRP blog-dshr-org-7999 123 19 was be VBD blog-dshr-org-7999 123 20 monitoring monitor VBG blog-dshr-org-7999 123 21 would would MD blog-dshr-org-7999 123 22 risk risk VB blog-dshr-org-7999 123 23 being be VBG blog-dshr-org-7999 123 24 " " `` blog-dshr-org-7999 123 25 named name VBN blog-dshr-org-7999 123 26 and and CC blog-dshr-org-7999 123 27 shamed shame VBN blog-dshr-org-7999 123 28 " " '' blog-dshr-org-7999 123 29 by by IN blog-dshr-org-7999 123 30 some some DT blog-dshr-org-7999 123 31 other other JJ blog-dshr-org-7999 123 32 CA CA NNP blog-dshr-org-7999 123 33 monitoring monitor VBG blog-dshr-org-7999 123 34 the the DT blog-dshr-org-7999 123 35 same same JJ blog-dshr-org-7999 123 36 log log NN blog-dshr-org-7999 123 37 , , , blog-dshr-org-7999 123 38 just just RB blog-dshr-org-7999 123 39 as as IN blog-dshr-org-7999 123 40 the the DT blog-dshr-org-7999 123 41 misbehaving misbehaving NN blog-dshr-org-7999 123 42 CA CA NNP blog-dshr-org-7999 123 43 would would MD blog-dshr-org-7999 123 44 be be VB blog-dshr-org-7999 123 45 " " `` blog-dshr-org-7999 123 46 named name VBN blog-dshr-org-7999 123 47 and and CC blog-dshr-org-7999 123 48 shamed shame VBN blog-dshr-org-7999 123 49 " " '' blog-dshr-org-7999 123 50 . . . blog-dshr-org-7999 124 1 It -PRON- PRP blog-dshr-org-7999 124 2 is be VBZ blog-dshr-org-7999 124 3 important important JJ blog-dshr-org-7999 124 4 to to TO blog-dshr-org-7999 124 5 observe observe VB blog-dshr-org-7999 124 6 that that DT blog-dshr-org-7999 124 7 , , , blog-dshr-org-7999 124 8 despite despite IN blog-dshr-org-7999 124 9 the the DT blog-dshr-org-7999 124 10 fact fact NN blog-dshr-org-7999 124 11 that that IN blog-dshr-org-7999 124 12 CAs ca NNS blog-dshr-org-7999 124 13 operate operate VBP blog-dshr-org-7999 124 14 the the DT blog-dshr-org-7999 124 15 majority majority NN blog-dshr-org-7999 124 16 of of IN blog-dshr-org-7999 124 17 the the DT blog-dshr-org-7999 124 18 CT CT NNP blog-dshr-org-7999 124 19 infrastructure infrastructure NN blog-dshr-org-7999 124 20 , , , blog-dshr-org-7999 124 21 its -PRON- PRP$ blog-dshr-org-7999 124 22 effectiveness effectiveness NN blog-dshr-org-7999 124 23 in in IN blog-dshr-org-7999 124 24 disciplining discipline VBG blog-dshr-org-7999 124 25 CAs CAs NNP blog-dshr-org-7999 124 26 is be VBZ blog-dshr-org-7999 124 27 not not RB blog-dshr-org-7999 124 28 impaired impaired JJ blog-dshr-org-7999 124 29 . . . blog-dshr-org-7999 125 1 Arnbak Arnbak NNP blog-dshr-org-7999 125 2 et et FW blog-dshr-org-7999 125 3 al al NNP blog-dshr-org-7999 125 4 write write VB blog-dshr-org-7999 125 5 : : : blog-dshr-org-7999 125 6 Information information NN blog-dshr-org-7999 125 7 asymmetry asymmetry NN blog-dshr-org-7999 125 8 prevents prevent VBZ blog-dshr-org-7999 125 9 buyers buyer NNS blog-dshr-org-7999 125 10 from from IN blog-dshr-org-7999 125 11 knowing know VBG blog-dshr-org-7999 125 12 what what WP blog-dshr-org-7999 125 13 CAs ca NNS blog-dshr-org-7999 125 14 are be VBP blog-dshr-org-7999 125 15 really really RB blog-dshr-org-7999 125 16 doing do VBG blog-dshr-org-7999 125 17 . . . blog-dshr-org-7999 126 1 Buyers buyer NNS blog-dshr-org-7999 126 2 are be VBP blog-dshr-org-7999 126 3 paying pay VBG blog-dshr-org-7999 126 4 for for IN blog-dshr-org-7999 126 5 the the DT blog-dshr-org-7999 126 6 perception perception NN blog-dshr-org-7999 126 7 of of IN blog-dshr-org-7999 126 8 security security NN blog-dshr-org-7999 126 9 , , , blog-dshr-org-7999 126 10 a a DT blog-dshr-org-7999 126 11 liability liability NN blog-dshr-org-7999 126 12 shield shield NN blog-dshr-org-7999 126 13 , , , blog-dshr-org-7999 126 14 and and CC blog-dshr-org-7999 126 15 trust trust NN blog-dshr-org-7999 126 16 signals signal NNS blog-dshr-org-7999 126 17 to to IN blog-dshr-org-7999 126 18 third third JJ blog-dshr-org-7999 126 19 parties party NNS blog-dshr-org-7999 126 20 . . . blog-dshr-org-7999 127 1 None none NN blog-dshr-org-7999 127 2 of of IN blog-dshr-org-7999 127 3 these these DT blog-dshr-org-7999 127 4 correlates correlate NNS blog-dshr-org-7999 127 5 verifiably verifiably RB blog-dshr-org-7999 127 6 with with IN blog-dshr-org-7999 127 7 actual actual JJ blog-dshr-org-7999 127 8 security security NN blog-dshr-org-7999 127 9 . . . blog-dshr-org-7999 128 1 Given give VBN blog-dshr-org-7999 128 2 that that IN blog-dshr-org-7999 128 3 CA CA NNP blog-dshr-org-7999 128 4 security security NN blog-dshr-org-7999 128 5 is be VBZ blog-dshr-org-7999 128 6 largely largely RB blog-dshr-org-7999 128 7 unobservable unobservable JJ blog-dshr-org-7999 128 8 , , , blog-dshr-org-7999 128 9 buyers buyer NNS blog-dshr-org-7999 128 10 ’ ’ POS blog-dshr-org-7999 128 11 demands demand NNS blog-dshr-org-7999 128 12 for for IN blog-dshr-org-7999 128 13 security security NN blog-dshr-org-7999 128 14 do do VBP blog-dshr-org-7999 128 15 not not RB blog-dshr-org-7999 128 16 necessarily necessarily RB blog-dshr-org-7999 128 17 translate translate VB blog-dshr-org-7999 128 18 into into IN blog-dshr-org-7999 128 19 strong strong JJ blog-dshr-org-7999 128 20 security security NN blog-dshr-org-7999 128 21 incentives incentive NNS blog-dshr-org-7999 128 22 for for IN blog-dshr-org-7999 128 23 CAs ca NNS blog-dshr-org-7999 128 24 . . . blog-dshr-org-7999 129 1 Negative negative JJ blog-dshr-org-7999 129 2 externalities externality NNS blog-dshr-org-7999 129 3 of of IN blog-dshr-org-7999 129 4 the the DT blog-dshr-org-7999 129 5 weakest weak JJS blog-dshr-org-7999 129 6 - - HYPH blog-dshr-org-7999 129 7 link link NN blog-dshr-org-7999 129 8 security security NN blog-dshr-org-7999 129 9 of of IN blog-dshr-org-7999 129 10 the the DT blog-dshr-org-7999 129 11 system system NN blog-dshr-org-7999 129 12 exacerbate exacerbate VB blog-dshr-org-7999 129 13 these these DT blog-dshr-org-7999 129 14 incentive incentive NN blog-dshr-org-7999 129 15 problems problem NNS blog-dshr-org-7999 129 16 . . . blog-dshr-org-7999 130 1 The the DT blog-dshr-org-7999 130 2 failure failure NN blog-dshr-org-7999 130 3 of of IN blog-dshr-org-7999 130 4 a a DT blog-dshr-org-7999 130 5 single single JJ blog-dshr-org-7999 130 6 CA CA NNP blog-dshr-org-7999 130 7 impacts impact VBZ blog-dshr-org-7999 130 8 the the DT blog-dshr-org-7999 130 9 whole whole JJ blog-dshr-org-7999 130 10 ecosystem ecosystem NN blog-dshr-org-7999 130 11 , , , blog-dshr-org-7999 130 12 not not RB blog-dshr-org-7999 130 13 just just RB blog-dshr-org-7999 130 14 that that IN blog-dshr-org-7999 130 15 CA CA NNP blog-dshr-org-7999 130 16 ’s ’s POS blog-dshr-org-7999 130 17 customers customer NNS blog-dshr-org-7999 130 18 . . . blog-dshr-org-7999 131 1 All all DT blog-dshr-org-7999 131 2 other other JJ blog-dshr-org-7999 131 3 things thing NNS blog-dshr-org-7999 131 4 being be VBG blog-dshr-org-7999 131 5 equal equal JJ blog-dshr-org-7999 131 6 , , , blog-dshr-org-7999 131 7 these these DT blog-dshr-org-7999 131 8 interdependencies interdependency NNS blog-dshr-org-7999 131 9 undermine undermine VBP blog-dshr-org-7999 131 10 the the DT blog-dshr-org-7999 131 11 incentives incentive NNS blog-dshr-org-7999 131 12 of of IN blog-dshr-org-7999 131 13 CAs ca NNS blog-dshr-org-7999 131 14 to to TO blog-dshr-org-7999 131 15 invest invest VB blog-dshr-org-7999 131 16 , , , blog-dshr-org-7999 131 17 as as IN blog-dshr-org-7999 131 18 the the DT blog-dshr-org-7999 131 19 security security NN blog-dshr-org-7999 131 20 of of IN blog-dshr-org-7999 131 21 their -PRON- PRP$ blog-dshr-org-7999 131 22 customers customer NNS blog-dshr-org-7999 131 23 depends depend VBZ blog-dshr-org-7999 131 24 on on IN blog-dshr-org-7999 131 25 the the DT blog-dshr-org-7999 131 26 efforts effort NNS blog-dshr-org-7999 131 27 of of IN blog-dshr-org-7999 131 28 all all DT blog-dshr-org-7999 131 29 other other JJ blog-dshr-org-7999 131 30 CAs ca NNS blog-dshr-org-7999 131 31 . . . blog-dshr-org-7999 132 1 And and CC blog-dshr-org-7999 132 2 : : : blog-dshr-org-7999 132 3 the the DT blog-dshr-org-7999 132 4 market market NN blog-dshr-org-7999 132 5 for for IN blog-dshr-org-7999 132 6 SSL SSL NNP blog-dshr-org-7999 132 7 certificates certificate NNS blog-dshr-org-7999 132 8 is be VBZ blog-dshr-org-7999 132 9 highly highly RB blog-dshr-org-7999 132 10 concentrated concentrated JJ blog-dshr-org-7999 132 11 , , , blog-dshr-org-7999 132 12 despite despite IN blog-dshr-org-7999 132 13 the the DT blog-dshr-org-7999 132 14 large large JJ blog-dshr-org-7999 132 15 number number NN blog-dshr-org-7999 132 16 of of IN blog-dshr-org-7999 132 17 issuers issuer NNS blog-dshr-org-7999 132 18 . . . blog-dshr-org-7999 133 1 In in IN blog-dshr-org-7999 133 2 fact fact NN blog-dshr-org-7999 133 3 , , , blog-dshr-org-7999 133 4 both both DT blog-dshr-org-7999 133 5 data data NN blog-dshr-org-7999 133 6 sets set NNS blog-dshr-org-7999 133 7 find find VBP blog-dshr-org-7999 133 8 that that IN blog-dshr-org-7999 133 9 around around RB blog-dshr-org-7999 133 10 75 75 CD blog-dshr-org-7999 133 11 percent percent NN blog-dshr-org-7999 133 12 of of IN blog-dshr-org-7999 133 13 SSL SSL NNP blog-dshr-org-7999 133 14 certificates certificate NNS blog-dshr-org-7999 133 15 in in IN blog-dshr-org-7999 133 16 use use NN blog-dshr-org-7999 133 17 on on IN blog-dshr-org-7999 133 18 the the DT blog-dshr-org-7999 133 19 public public JJ blog-dshr-org-7999 133 20 Web web NN blog-dshr-org-7999 133 21 have have VBP blog-dshr-org-7999 133 22 been be VBN blog-dshr-org-7999 133 23 issued issue VBN blog-dshr-org-7999 133 24 by by IN blog-dshr-org-7999 133 25 just just RB blog-dshr-org-7999 133 26 three three CD blog-dshr-org-7999 133 27 companies company NNS blog-dshr-org-7999 133 28 : : : blog-dshr-org-7999 133 29 Symantec Symantec NNP blog-dshr-org-7999 133 30 , , , blog-dshr-org-7999 133 31 GoDaddy GoDaddy NNP blog-dshr-org-7999 133 32 , , , blog-dshr-org-7999 133 33 and and CC blog-dshr-org-7999 133 34 Comodo Comodo NNP blog-dshr-org-7999 133 35 . . . blog-dshr-org-7999 134 1 Let let VB blog-dshr-org-7999 134 2 's -PRON- PRP blog-dshr-org-7999 134 3 Encrypt Encrypt NNP blog-dshr-org-7999 134 4 may may MD blog-dshr-org-7999 134 5 have have VB blog-dshr-org-7999 134 6 had have VBN blog-dshr-org-7999 134 7 some some DT blog-dshr-org-7999 134 8 effect effect NN blog-dshr-org-7999 134 9 on on IN blog-dshr-org-7999 134 10 these these DT blog-dshr-org-7999 134 11 numbers number NNS blog-dshr-org-7999 134 12 , , , blog-dshr-org-7999 134 13 which which WDT blog-dshr-org-7999 134 14 are be VBP blog-dshr-org-7999 134 15 from from IN blog-dshr-org-7999 134 16 2014 2014 CD blog-dshr-org-7999 134 17 . . . blog-dshr-org-7999 135 1 All all DT blog-dshr-org-7999 135 2 three three CD blog-dshr-org-7999 135 3 major major JJ blog-dshr-org-7999 135 4 CAs ca NNS blog-dshr-org-7999 135 5 have have VBP blog-dshr-org-7999 135 6 suffered suffer VBN blog-dshr-org-7999 135 7 reputational reputational JJ blog-dshr-org-7999 135 8 damage damage NN blog-dshr-org-7999 135 9 from from IN blog-dshr-org-7999 135 10 recent recent JJ blog-dshr-org-7999 135 11 security security NN blog-dshr-org-7999 135 12 failures failure NNS blog-dshr-org-7999 135 13 , , , blog-dshr-org-7999 135 14 although although IN blog-dshr-org-7999 135 15 because because IN blog-dshr-org-7999 135 16 they -PRON- PRP blog-dshr-org-7999 135 17 are be VBP blog-dshr-org-7999 135 18 " " `` blog-dshr-org-7999 135 19 too too RB blog-dshr-org-7999 135 20 big big JJ blog-dshr-org-7999 135 21 to to TO blog-dshr-org-7999 135 22 fail fail VB blog-dshr-org-7999 135 23 " " `` blog-dshr-org-7999 135 24 this this DT blog-dshr-org-7999 135 25 has have VBZ blog-dshr-org-7999 135 26 n't not RB blog-dshr-org-7999 135 27 impacted impact VBN blog-dshr-org-7999 135 28 their -PRON- PRP$ blog-dshr-org-7999 135 29 business business NN blog-dshr-org-7999 135 30 much much JJ blog-dshr-org-7999 135 31 . . . blog-dshr-org-7999 136 1 However however RB blog-dshr-org-7999 136 2 , , , blog-dshr-org-7999 136 3 as as IN blog-dshr-org-7999 136 4 whales whale NNS blog-dshr-org-7999 136 5 in in IN blog-dshr-org-7999 136 6 a a DT blog-dshr-org-7999 136 7 large large JJ blog-dshr-org-7999 136 8 school school NN blog-dshr-org-7999 136 9 of of IN blog-dshr-org-7999 136 10 minnows minnow NNS blog-dshr-org-7999 136 11 it -PRON- PRP blog-dshr-org-7999 136 12 is be VBZ blog-dshr-org-7999 136 13 in in IN blog-dshr-org-7999 136 14 their -PRON- PRP$ blog-dshr-org-7999 136 15 interest interest NN blog-dshr-org-7999 136 16 to to TO blog-dshr-org-7999 136 17 impose impose VB blog-dshr-org-7999 136 18 costs cost NNS blog-dshr-org-7999 136 19 ( ( -LRB- blog-dshr-org-7999 136 20 for for IN blog-dshr-org-7999 136 21 implementing implement VBG blog-dshr-org-7999 136 22 CT CT NNP blog-dshr-org-7999 136 23 ) ) -RRB- blog-dshr-org-7999 136 24 and and CC blog-dshr-org-7999 136 25 penalties penalty NNS blog-dshr-org-7999 136 26 ( ( -LRB- blog-dshr-org-7999 136 27 for for IN blog-dshr-org-7999 136 28 security security NN blog-dshr-org-7999 136 29 lapses lapse NNS blog-dshr-org-7999 136 30 ) ) -RRB- blog-dshr-org-7999 136 31 on on IN blog-dshr-org-7999 136 32 the the DT blog-dshr-org-7999 136 33 minnows minnow NNS blog-dshr-org-7999 136 34 . . . blog-dshr-org-7999 137 1 Note note VB blog-dshr-org-7999 137 2 that that IN blog-dshr-org-7999 137 3 Google Google NNP blog-dshr-org-7999 137 4 was be VBD blog-dshr-org-7999 137 5 sufficiently sufficiently RB blog-dshr-org-7999 137 6 annoyed annoy VBN blog-dshr-org-7999 137 7 with with IN blog-dshr-org-7999 137 8 Symantec Symantec NNP blog-dshr-org-7999 137 9 's 's POS blog-dshr-org-7999 137 10 persistent persistent JJ blog-dshr-org-7999 137 11 lack lack NN blog-dshr-org-7999 137 12 of of IN blog-dshr-org-7999 137 13 security security NN blog-dshr-org-7999 137 14 that that WDT blog-dshr-org-7999 137 15 it -PRON- PRP blog-dshr-org-7999 137 16 set set VBD blog-dshr-org-7999 137 17 up up RP blog-dshr-org-7999 137 18 its -PRON- PRP$ blog-dshr-org-7999 137 19 own own JJ blog-dshr-org-7999 137 20 CA ca NN blog-dshr-org-7999 137 21 . . . blog-dshr-org-7999 138 1 The the DT blog-dshr-org-7999 138 2 threat threat NN blog-dshr-org-7999 138 3 that that IN blog-dshr-org-7999 138 4 their -PRON- PRP$ blog-dshr-org-7999 138 5 business business NN blog-dshr-org-7999 138 6 could could MD blog-dshr-org-7999 138 7 be be VB blog-dshr-org-7999 138 8 taken take VBN blog-dshr-org-7999 138 9 away away RB blog-dshr-org-7999 138 10 by by IN blog-dshr-org-7999 138 11 the the DT blog-dshr-org-7999 138 12 tech tech NN blog-dshr-org-7999 138 13 oligopoly oligopoly NN blog-dshr-org-7999 138 14 is be VBZ blog-dshr-org-7999 138 15 real real JJ blog-dshr-org-7999 138 16 , , , blog-dshr-org-7999 138 17 and and CC blog-dshr-org-7999 138 18 cooperating cooperate VBG blog-dshr-org-7999 138 19 with with IN blog-dshr-org-7999 138 20 Google Google NNP blog-dshr-org-7999 138 21 may may MD blog-dshr-org-7999 138 22 have have VB blog-dshr-org-7999 138 23 been be VBN blog-dshr-org-7999 138 24 the the DT blog-dshr-org-7999 138 25 least least JJS blog-dshr-org-7999 138 26 bad bad JJ blog-dshr-org-7999 138 27 choice choice NN blog-dshr-org-7999 138 28 . . . blog-dshr-org-7999 139 1 1-yr 1-yr CD blog-dshr-org-7999 139 2 Bitcoin Bitcoin NNP blog-dshr-org-7999 139 3 " " '' blog-dshr-org-7999 139 4 price price NN blog-dshr-org-7999 139 5 " " '' blog-dshr-org-7999 139 6 Because because IN blog-dshr-org-7999 139 7 these these DT blog-dshr-org-7999 139 8 major major JJ blog-dshr-org-7999 139 9 corporations corporation NNS blog-dshr-org-7999 139 10 have have VBP blog-dshr-org-7999 139 11 an an DT blog-dshr-org-7999 139 12 incentive incentive NN blog-dshr-org-7999 139 13 to to TO blog-dshr-org-7999 139 14 pay pay VB blog-dshr-org-7999 139 15 for for IN blog-dshr-org-7999 139 16 the the DT blog-dshr-org-7999 139 17 CT CT NNP blog-dshr-org-7999 139 18 infrastructure infrastructure NN blog-dshr-org-7999 139 19 , , , blog-dshr-org-7999 139 20 it -PRON- PRP blog-dshr-org-7999 139 21 is be VBZ blog-dshr-org-7999 139 22 sustainable sustainable JJ blog-dshr-org-7999 139 23 in in IN blog-dshr-org-7999 139 24 a a DT blog-dshr-org-7999 139 25 way way NN blog-dshr-org-7999 139 26 that that WDT blog-dshr-org-7999 139 27 a a DT blog-dshr-org-7999 139 28 market market NN blog-dshr-org-7999 139 29 of of IN blog-dshr-org-7999 139 30 separate separate JJ blog-dshr-org-7999 139 31 businesses business NNS blog-dshr-org-7999 139 32 , , , blog-dshr-org-7999 139 33 or or CC blog-dshr-org-7999 139 34 a a DT blog-dshr-org-7999 139 35 permissionless permissionless NN blog-dshr-org-7999 139 36 blockchain blockchain NN blog-dshr-org-7999 139 37 supported support VBN blog-dshr-org-7999 139 38 by by IN blog-dshr-org-7999 139 39 speculation speculation NN blog-dshr-org-7999 139 40 in in IN blog-dshr-org-7999 139 41 a a DT blog-dshr-org-7999 139 42 cryptocurrency cryptocurrency NN blog-dshr-org-7999 139 43 would would MD blog-dshr-org-7999 139 44 not not RB blog-dshr-org-7999 139 45 be be VB blog-dshr-org-7999 139 46 . . . blog-dshr-org-7999 140 1 Fundamentally fundamentally RB blog-dshr-org-7999 140 2 , , , blog-dshr-org-7999 140 3 if if IN blog-dshr-org-7999 140 4 applications application NNS blog-dshr-org-7999 140 5 such such JJ blog-dshr-org-7999 140 6 as as IN blog-dshr-org-7999 140 7 CT CT NNP blog-dshr-org-7999 140 8 attempt attempt NN blog-dshr-org-7999 140 9 to to TO blog-dshr-org-7999 140 10 provide provide VB blog-dshr-org-7999 140 11 absolute absolute JJ blog-dshr-org-7999 140 12 security security NN blog-dshr-org-7999 140 13 they -PRON- PRP blog-dshr-org-7999 140 14 are be VBP blog-dshr-org-7999 140 15 doomed doom VBN blog-dshr-org-7999 140 16 to to TO blog-dshr-org-7999 140 17 fail fail VB blog-dshr-org-7999 140 18 , , , blog-dshr-org-7999 140 19 and and CC blog-dshr-org-7999 140 20 their -PRON- PRP$ blog-dshr-org-7999 140 21 failures failure NNS blog-dshr-org-7999 140 22 will will MD blog-dshr-org-7999 140 23 be be VB blog-dshr-org-7999 140 24 abrupt abrupt JJ blog-dshr-org-7999 140 25 and and CC blog-dshr-org-7999 140 26 complete complete JJ blog-dshr-org-7999 140 27 . . . blog-dshr-org-7999 141 1 It -PRON- PRP blog-dshr-org-7999 141 2 is be VBZ blog-dshr-org-7999 141 3 more more RBR blog-dshr-org-7999 141 4 important important JJ blog-dshr-org-7999 141 5 to to TO blog-dshr-org-7999 141 6 provide provide VB blog-dshr-org-7999 141 7 the the DT blog-dshr-org-7999 141 8 highest high JJS blog-dshr-org-7999 141 9 level level NN blog-dshr-org-7999 141 10 of of IN blog-dshr-org-7999 141 11 security security NN blog-dshr-org-7999 141 12 compatible compatible JJ blog-dshr-org-7999 141 13 with with IN blog-dshr-org-7999 141 14 resilience resilience NN blog-dshr-org-7999 141 15 , , , blog-dshr-org-7999 141 16 so so IN blog-dshr-org-7999 141 17 that that IN blog-dshr-org-7999 141 18 the the DT blog-dshr-org-7999 141 19 inevitable inevitable JJ blog-dshr-org-7999 141 20 failures failure NNS blog-dshr-org-7999 141 21 are be VBP blog-dshr-org-7999 141 22 contained contain VBN blog-dshr-org-7999 141 23 and and CC blog-dshr-org-7999 141 24 manageable manageable JJ blog-dshr-org-7999 141 25 . . . blog-dshr-org-7999 142 1 This this DT blog-dshr-org-7999 142 2 is be VBZ blog-dshr-org-7999 142 3 one one CD blog-dshr-org-7999 142 4 of of IN blog-dshr-org-7999 142 5 the the DT blog-dshr-org-7999 142 6 reasons reason NNS blog-dshr-org-7999 142 7 why why WRB blog-dshr-org-7999 142 8 permissionless permissionless NN blog-dshr-org-7999 142 9 blockchains blockchain NNS blog-dshr-org-7999 142 10 , , , blog-dshr-org-7999 142 11 subject subject JJ blog-dshr-org-7999 142 12 to to IN blog-dshr-org-7999 142 13 51 51 CD blog-dshr-org-7999 142 14 % % NN blog-dshr-org-7999 142 15 attacks attack NNS blog-dshr-org-7999 142 16 , , , blog-dshr-org-7999 142 17 and and CC blog-dshr-org-7999 142 18 permissioned permissione VBD blog-dshr-org-7999 142 19 blockchains blockchain NNS blog-dshr-org-7999 142 20 , , , blog-dshr-org-7999 142 21 with with IN blog-dshr-org-7999 142 22 a a DT blog-dshr-org-7999 142 23 single single JJ blog-dshr-org-7999 142 24 , , , blog-dshr-org-7999 142 25 central central JJ blog-dshr-org-7999 142 26 point point NN blog-dshr-org-7999 142 27 of of IN blog-dshr-org-7999 142 28 failure failure NN blog-dshr-org-7999 142 29 , , , blog-dshr-org-7999 142 30 are be VBP blog-dshr-org-7999 142 31 not not RB blog-dshr-org-7999 142 32 suitable suitable JJ blog-dshr-org-7999 142 33 . . . blog-dshr-org-7999 143 1 LOCKSS LOCKSS NNP blog-dshr-org-7999 143 2 Archives Archives NNPS blog-dshr-org-7999 143 3 care care VBP blog-dshr-org-7999 143 4 about about IN blog-dshr-org-7999 143 5 the the DT blog-dshr-org-7999 143 6 authenticity authenticity NN blog-dshr-org-7999 143 7 of of IN blog-dshr-org-7999 143 8 the the DT blog-dshr-org-7999 143 9 content content NN blog-dshr-org-7999 143 10 they -PRON- PRP blog-dshr-org-7999 143 11 collect collect VBP blog-dshr-org-7999 143 12 , , , blog-dshr-org-7999 143 13 preserve preserve VB blog-dshr-org-7999 143 14 and and CC blog-dshr-org-7999 143 15 disseminate disseminate VB blog-dshr-org-7999 143 16 . . . blog-dshr-org-7999 144 1 From from IN blog-dshr-org-7999 144 2 the the DT blog-dshr-org-7999 144 3 start start NN blog-dshr-org-7999 144 4 of of IN blog-dshr-org-7999 144 5 the the DT blog-dshr-org-7999 144 6 LOCKSS LOCKSS NNP blog-dshr-org-7999 144 7 Program Program NNP blog-dshr-org-7999 144 8 in in IN blog-dshr-org-7999 144 9 1998 1998 CD blog-dshr-org-7999 144 10 we -PRON- PRP blog-dshr-org-7999 144 11 realized realize VBD blog-dshr-org-7999 144 12 that that IN blog-dshr-org-7999 144 13 : : : blog-dshr-org-7999 144 14 The the DT blog-dshr-org-7999 144 15 LOCKSS LOCKSS NNP blog-dshr-org-7999 144 16 system system NN blog-dshr-org-7999 144 17 preserves preserve NNS blog-dshr-org-7999 144 18 e e NN blog-dshr-org-7999 144 19 - - NNS blog-dshr-org-7999 144 20 journals journal NNS blog-dshr-org-7999 144 21 that that WDT blog-dshr-org-7999 144 22 have have VBP blog-dshr-org-7999 144 23 intrinsic intrinsic JJ blog-dshr-org-7999 144 24 value value NN blog-dshr-org-7999 144 25 and and CC blog-dshr-org-7999 144 26 contain contain VB blog-dshr-org-7999 144 27 information information NN blog-dshr-org-7999 144 28 that that IN blog-dshr-org-7999 144 29 powerful powerful JJ blog-dshr-org-7999 144 30 interests interest NNS blog-dshr-org-7999 144 31 might may MD blog-dshr-org-7999 144 32 want want VB blog-dshr-org-7999 144 33 changed change VBN blog-dshr-org-7999 144 34 or or CC blog-dshr-org-7999 144 35 suppressed suppress VBN blog-dshr-org-7999 144 36 . . . blog-dshr-org-7999 145 1 To to IN blog-dshr-org-7999 145 2 a a DT blog-dshr-org-7999 145 3 much much RB blog-dshr-org-7999 145 4 greater great JJR blog-dshr-org-7999 145 5 extent extent NN blog-dshr-org-7999 145 6 now now RB blog-dshr-org-7999 145 7 than than IN blog-dshr-org-7999 145 8 when when WRB blog-dshr-org-7999 145 9 we -PRON- PRP blog-dshr-org-7999 145 10 started start VBD blog-dshr-org-7999 145 11 , , , blog-dshr-org-7999 145 12 nodes node NNS blog-dshr-org-7999 145 13 in in IN blog-dshr-org-7999 145 14 a a DT blog-dshr-org-7999 145 15 LOCKSS LOCKSS NNP blog-dshr-org-7999 145 16 network network NN blog-dshr-org-7999 145 17 ( ( -LRB- blog-dshr-org-7999 145 18 LOCKSS LOCKSS NNP blog-dshr-org-7999 145 19 boxes box NNS blog-dshr-org-7999 145 20 ) ) -RRB- blog-dshr-org-7999 145 21 collect collect VBP blog-dshr-org-7999 145 22 and and CC blog-dshr-org-7999 145 23 disseminate disseminate VBP blog-dshr-org-7999 145 24 content content NN blog-dshr-org-7999 145 25 via via IN blog-dshr-org-7999 145 26 HTTPS HTTPS NNP blog-dshr-org-7999 145 27 , , , blog-dshr-org-7999 145 28 so so RB blog-dshr-org-7999 145 29 CT CT NNP blog-dshr-org-7999 145 30 is be VBZ blog-dshr-org-7999 145 31 an an DT blog-dshr-org-7999 145 32 important important JJ blog-dshr-org-7999 145 33 advance advance NN blog-dshr-org-7999 145 34 in in IN blog-dshr-org-7999 145 35 archival archival NNP blog-dshr-org-7999 145 36 authenticity authenticity NN blog-dshr-org-7999 145 37 . . . blog-dshr-org-7999 146 1 Five five CD blog-dshr-org-7999 146 2 years year NNS blog-dshr-org-7999 146 3 ago ago RB blog-dshr-org-7999 146 4 I -PRON- PRP blog-dshr-org-7999 146 5 compared compare VBD blog-dshr-org-7999 146 6 the the DT blog-dshr-org-7999 146 7 problem problem NN blog-dshr-org-7999 146 8 of of IN blog-dshr-org-7999 146 9 verifying verify VBG blog-dshr-org-7999 146 10 certificates certificate NNS blog-dshr-org-7999 146 11 to to IN blog-dshr-org-7999 146 12 the the DT blog-dshr-org-7999 146 13 problem problem NN blog-dshr-org-7999 146 14 of of IN blog-dshr-org-7999 146 15 verifying verify VBG blog-dshr-org-7999 146 16 content content NN blog-dshr-org-7999 146 17 in in IN blog-dshr-org-7999 146 18 a a DT blog-dshr-org-7999 146 19 digital digital JJ blog-dshr-org-7999 146 20 preservation preservation NN blog-dshr-org-7999 146 21 system system NN blog-dshr-org-7999 146 22 such such JJ blog-dshr-org-7999 146 23 as as IN blog-dshr-org-7999 146 24 LOCKSS LOCKSS NNP blog-dshr-org-7999 146 25 : : : blog-dshr-org-7999 146 26 A a DT blog-dshr-org-7999 146 27 bad bad JJ blog-dshr-org-7999 146 28 guy guy NN blog-dshr-org-7999 146 29 subverts subvert VBZ blog-dshr-org-7999 146 30 an an DT blog-dshr-org-7999 146 31 SSL SSL NNP blog-dshr-org-7999 146 32 connection connection NN blog-dshr-org-7999 146 33 from from IN blog-dshr-org-7999 146 34 a a DT blog-dshr-org-7999 146 35 browser browser NN blog-dshr-org-7999 146 36 to to IN blog-dshr-org-7999 146 37 a a DT blog-dshr-org-7999 146 38 website website NN blog-dshr-org-7999 146 39 by by IN blog-dshr-org-7999 146 40 intercepting intercept VBG blog-dshr-org-7999 146 41 the the DT blog-dshr-org-7999 146 42 connection connection NN blog-dshr-org-7999 146 43 and and CC blog-dshr-org-7999 146 44 supplying supply VBG blog-dshr-org-7999 146 45 a a DT blog-dshr-org-7999 146 46 valid valid JJ blog-dshr-org-7999 146 47 certificate certificate NN blog-dshr-org-7999 146 48 that that WDT blog-dshr-org-7999 146 49 is be VBZ blog-dshr-org-7999 146 50 different different JJ blog-dshr-org-7999 146 51 from from IN blog-dshr-org-7999 146 52 the the DT blog-dshr-org-7999 146 53 one one NN blog-dshr-org-7999 146 54 that that WDT blog-dshr-org-7999 146 55 actually actually RB blog-dshr-org-7999 146 56 certifies certify VBZ blog-dshr-org-7999 146 57 the the DT blog-dshr-org-7999 146 58 website website NN blog-dshr-org-7999 146 59 . . . blog-dshr-org-7999 147 1 For for IN blog-dshr-org-7999 147 2 example example NN blog-dshr-org-7999 147 3 , , , blog-dshr-org-7999 147 4 it -PRON- PRP blog-dshr-org-7999 147 5 might may MD blog-dshr-org-7999 147 6 be be VB blog-dshr-org-7999 147 7 signed sign VBN blog-dshr-org-7999 147 8 by by IN blog-dshr-org-7999 147 9 the the DT blog-dshr-org-7999 147 10 Dept Dept NNP blog-dshr-org-7999 147 11 . . . blog-dshr-org-7999 148 1 of of IN blog-dshr-org-7999 148 2 Homeland Homeland NNP blog-dshr-org-7999 148 3 Security Security NNP blog-dshr-org-7999 148 4 instead instead RB blog-dshr-org-7999 148 5 of of IN blog-dshr-org-7999 148 6 by by IN blog-dshr-org-7999 148 7 Thawte Thawte NNP blog-dshr-org-7999 148 8 . . . blog-dshr-org-7999 149 1 The the DT blog-dshr-org-7999 149 2 browser browser NN blog-dshr-org-7999 149 3 trusts trust VBZ blog-dshr-org-7999 149 4 both both DT blog-dshr-org-7999 149 5 . . . blog-dshr-org-7999 150 1 Thus thus RB blog-dshr-org-7999 150 2 the the DT blog-dshr-org-7999 150 3 question question NN blog-dshr-org-7999 150 4 is be VBZ blog-dshr-org-7999 150 5 : : : blog-dshr-org-7999 150 6 " " `` blog-dshr-org-7999 150 7 how how WRB blog-dshr-org-7999 150 8 to to TO blog-dshr-org-7999 150 9 detect detect VB blog-dshr-org-7999 150 10 that that IN blog-dshr-org-7999 150 11 the the DT blog-dshr-org-7999 150 12 certificate certificate NN blog-dshr-org-7999 150 13 is be VBZ blog-dshr-org-7999 150 14 not not RB blog-dshr-org-7999 150 15 the the DT blog-dshr-org-7999 150 16 one one NN blog-dshr-org-7999 150 17 it -PRON- PRP blog-dshr-org-7999 150 18 should should MD blog-dshr-org-7999 150 19 be be VB blog-dshr-org-7999 150 20 ? ? . blog-dshr-org-7999 150 21 " " '' blog-dshr-org-7999 151 1 This this DT blog-dshr-org-7999 151 2 is be VBZ blog-dshr-org-7999 151 3 a a DT blog-dshr-org-7999 151 4 similar similar JJ blog-dshr-org-7999 151 5 question question NN blog-dshr-org-7999 151 6 to to IN blog-dshr-org-7999 151 7 the the DT blog-dshr-org-7999 151 8 digital digital JJ blog-dshr-org-7999 151 9 preservation preservation NN blog-dshr-org-7999 151 10 question question NN blog-dshr-org-7999 151 11 : : : blog-dshr-org-7999 151 12 " " `` blog-dshr-org-7999 151 13 how how WRB blog-dshr-org-7999 151 14 to to TO blog-dshr-org-7999 151 15 detect detect VB blog-dshr-org-7999 151 16 that that IN blog-dshr-org-7999 151 17 the the DT blog-dshr-org-7999 151 18 content content NN blog-dshr-org-7999 151 19 is be VBZ blog-dshr-org-7999 151 20 not not RB blog-dshr-org-7999 151 21 what what WP blog-dshr-org-7999 151 22 it -PRON- PRP blog-dshr-org-7999 151 23 should should MD blog-dshr-org-7999 151 24 be be VB blog-dshr-org-7999 151 25 ? ? . blog-dshr-org-7999 151 26 " " '' blog-dshr-org-7999 152 1 On on IN blog-dshr-org-7999 152 2 a a DT blog-dshr-org-7999 152 3 second second JJ blog-dshr-org-7999 152 4 or or CC blog-dshr-org-7999 152 5 subsequent subsequent JJ blog-dshr-org-7999 152 6 visit visit NN blog-dshr-org-7999 152 7 the the DT blog-dshr-org-7999 152 8 browser browser NN blog-dshr-org-7999 152 9 can can MD blog-dshr-org-7999 152 10 compare compare VB blog-dshr-org-7999 152 11 the the DT blog-dshr-org-7999 152 12 certificate certificate NN blog-dshr-org-7999 152 13 with with IN blog-dshr-org-7999 152 14 the the DT blog-dshr-org-7999 152 15 one one NN blog-dshr-org-7999 152 16 it -PRON- PRP blog-dshr-org-7999 152 17 saw see VBD blog-dshr-org-7999 152 18 earlier early RBR blog-dshr-org-7999 152 19 , , , blog-dshr-org-7999 152 20 but but CC blog-dshr-org-7999 152 21 this this DT blog-dshr-org-7999 152 22 does do VBZ blog-dshr-org-7999 152 23 n't not RB blog-dshr-org-7999 152 24 help help VB blog-dshr-org-7999 152 25 the the DT blog-dshr-org-7999 152 26 first first JJ blog-dshr-org-7999 152 27 time time NN blog-dshr-org-7999 152 28 and and CC blog-dshr-org-7999 152 29 it -PRON- PRP blog-dshr-org-7999 152 30 is be VBZ blog-dshr-org-7999 152 31 n't not RB blog-dshr-org-7999 152 32 conclusive conclusive JJ blog-dshr-org-7999 152 33 . . . blog-dshr-org-7999 153 1 There there EX blog-dshr-org-7999 153 2 are be VBP blog-dshr-org-7999 153 3 valid valid JJ blog-dshr-org-7999 153 4 reasons reason NNS blog-dshr-org-7999 153 5 why why WRB blog-dshr-org-7999 153 6 a a DT blog-dshr-org-7999 153 7 certificate certificate NN blog-dshr-org-7999 153 8 can can MD blog-dshr-org-7999 153 9 change change VB blog-dshr-org-7999 153 10 , , , blog-dshr-org-7999 153 11 for for IN blog-dshr-org-7999 153 12 example example NN blog-dshr-org-7999 153 13 to to TO blog-dshr-org-7999 153 14 replace replace VB blog-dshr-org-7999 153 15 one one NN blog-dshr-org-7999 153 16 that that WDT blog-dshr-org-7999 153 17 has have VBZ blog-dshr-org-7999 153 18 expired expire VBN blog-dshr-org-7999 153 19 . . . blog-dshr-org-7999 154 1 From from IN blog-dshr-org-7999 154 2 the the DT blog-dshr-org-7999 154 3 start start NN blog-dshr-org-7999 154 4 in in IN blog-dshr-org-7999 154 5 1998 1998 CD blog-dshr-org-7999 154 6 the the DT blog-dshr-org-7999 154 7 LOCKSS LOCKSS NNP blog-dshr-org-7999 154 8 system system NN blog-dshr-org-7999 154 9 used use VBD blog-dshr-org-7999 154 10 similar similar JJ blog-dshr-org-7999 154 11 resilience resilience NN blog-dshr-org-7999 154 12 techniques technique NNS blog-dshr-org-7999 154 13 to to IN blog-dshr-org-7999 154 14 CT CT NNP blog-dshr-org-7999 154 15 , , , blog-dshr-org-7999 154 16 for for IN blog-dshr-org-7999 154 17 the the DT blog-dshr-org-7999 154 18 same same JJ blog-dshr-org-7999 154 19 reason reason NN blog-dshr-org-7999 154 20 . . . blog-dshr-org-7999 155 1 Each each DT blog-dshr-org-7999 155 2 journal journal NN blog-dshr-org-7999 155 3 article article NN blog-dshr-org-7999 155 4 was be VBD blog-dshr-org-7999 155 5 stored store VBN blog-dshr-org-7999 155 6 in in IN blog-dshr-org-7999 155 7 some some DT blog-dshr-org-7999 155 8 , , , blog-dshr-org-7999 155 9 but but CC blog-dshr-org-7999 155 10 probably probably RB blog-dshr-org-7999 155 11 not not RB blog-dshr-org-7999 155 12 all all DT blog-dshr-org-7999 155 13 of of IN blog-dshr-org-7999 155 14 the the DT blog-dshr-org-7999 155 15 boxes box NNS blog-dshr-org-7999 155 16 , , , blog-dshr-org-7999 155 17 and and CC blog-dshr-org-7999 155 18 : : : blog-dshr-org-7999 155 19 Each each DT blog-dshr-org-7999 155 20 box box NN blog-dshr-org-7999 155 21 operates operate VBZ blog-dshr-org-7999 155 22 independently independently RB blog-dshr-org-7999 155 23 . . . blog-dshr-org-7999 156 1 Each each DT blog-dshr-org-7999 156 2 box box NN blog-dshr-org-7999 156 3 gets get VBZ blog-dshr-org-7999 156 4 its -PRON- PRP$ blog-dshr-org-7999 156 5 content content NN blog-dshr-org-7999 156 6 directly directly RB blog-dshr-org-7999 156 7 from from IN blog-dshr-org-7999 156 8 the the DT blog-dshr-org-7999 156 9 publisher publisher NN blog-dshr-org-7999 156 10 , , , blog-dshr-org-7999 156 11 not not RB blog-dshr-org-7999 156 12 via via IN blog-dshr-org-7999 156 13 replication replication NN blog-dshr-org-7999 156 14 from from IN blog-dshr-org-7999 156 15 other other JJ blog-dshr-org-7999 156 16 boxes box NNS blog-dshr-org-7999 156 17 . . . blog-dshr-org-7999 157 1 Each each DT blog-dshr-org-7999 157 2 box box NN blog-dshr-org-7999 157 3 contains contain VBZ blog-dshr-org-7999 157 4 a a DT blog-dshr-org-7999 157 5 subset subset NN blog-dshr-org-7999 157 6 of of IN blog-dshr-org-7999 157 7 the the DT blog-dshr-org-7999 157 8 total total JJ blog-dshr-org-7999 157 9 information information NN blog-dshr-org-7999 157 10 content content NN blog-dshr-org-7999 157 11 of of IN blog-dshr-org-7999 157 12 the the DT blog-dshr-org-7999 157 13 system system NN blog-dshr-org-7999 157 14 . . . blog-dshr-org-7999 158 1 Unlike unlike IN blog-dshr-org-7999 158 2 CT CT NNP blog-dshr-org-7999 158 3 , , , blog-dshr-org-7999 158 4 there there EX blog-dshr-org-7999 158 5 is be VBZ blog-dshr-org-7999 158 6 a a DT blog-dshr-org-7999 158 7 consensus consensus NN blog-dshr-org-7999 158 8 mechanism mechanism NN blog-dshr-org-7999 158 9 operating operate VBG blog-dshr-org-7999 158 10 between between IN blog-dshr-org-7999 158 11 the the DT blog-dshr-org-7999 158 12 boxes box NNS blog-dshr-org-7999 158 13 . . . blog-dshr-org-7999 159 1 But but CC blog-dshr-org-7999 159 2 , , , blog-dshr-org-7999 159 3 unlike unlike IN blog-dshr-org-7999 159 4 blockchains blockchain NNS blog-dshr-org-7999 159 5 , , , blog-dshr-org-7999 159 6 it -PRON- PRP blog-dshr-org-7999 159 7 is be VBZ blog-dshr-org-7999 159 8 not not RB blog-dshr-org-7999 159 9 designed design VBN blog-dshr-org-7999 159 10 to to TO blog-dshr-org-7999 159 11 enforce enforce VB blog-dshr-org-7999 159 12 lockstep lockstep NN blog-dshr-org-7999 159 13 agreement agreement NN blog-dshr-org-7999 159 14 among among IN blog-dshr-org-7999 159 15 the the DT blog-dshr-org-7999 159 16 boxes box NNS blog-dshr-org-7999 159 17 . . . blog-dshr-org-7999 160 1 It -PRON- PRP blog-dshr-org-7999 160 2 allows allow VBZ blog-dshr-org-7999 160 3 a a DT blog-dshr-org-7999 160 4 box box NN blog-dshr-org-7999 160 5 to to TO blog-dshr-org-7999 160 6 discover discover VB blog-dshr-org-7999 160 7 whether whether IN blog-dshr-org-7999 160 8 its -PRON- PRP$ blog-dshr-org-7999 160 9 content content NN blog-dshr-org-7999 160 10 matches match VBZ blog-dshr-org-7999 160 11 the the DT blog-dshr-org-7999 160 12 consensus consensus NN blog-dshr-org-7999 160 13 of of IN blog-dshr-org-7999 160 14 a a DT blog-dshr-org-7999 160 15 sample sample NN blog-dshr-org-7999 160 16 of of IN blog-dshr-org-7999 160 17 the the DT blog-dshr-org-7999 160 18 other other JJ blog-dshr-org-7999 160 19 boxes box NNS blog-dshr-org-7999 160 20 . . . blog-dshr-org-7999 161 1 This this DT blog-dshr-org-7999 161 2 is be VBZ blog-dshr-org-7999 161 3 similar similar JJ blog-dshr-org-7999 161 4 to to IN blog-dshr-org-7999 161 5 the the DT blog-dshr-org-7999 161 6 way way NN blog-dshr-org-7999 161 7 that that WDT blog-dshr-org-7999 161 8 CT CT NNP blog-dshr-org-7999 161 9 's 's POS blog-dshr-org-7999 161 10 monitors monitor NNS blog-dshr-org-7999 161 11 and and CC blog-dshr-org-7999 161 12 auditors auditor NNS blog-dshr-org-7999 161 13 examine examine VBP blog-dshr-org-7999 161 14 subsets subset NNS blog-dshr-org-7999 161 15 of of IN blog-dshr-org-7999 161 16 the the DT blog-dshr-org-7999 161 17 logs log NNS blog-dshr-org-7999 161 18 to to TO blog-dshr-org-7999 161 19 detect detect VB blog-dshr-org-7999 161 20 misbehavior misbehavior NN blog-dshr-org-7999 161 21 . . . blog-dshr-org-7999 162 1 Monitoring monitoring NN blog-dshr-org-7999 162 2 and and CC blog-dshr-org-7999 162 3 auditing auditing NN blog-dshr-org-7999 162 4 is be VBZ blog-dshr-org-7999 162 5 performed perform VBN blog-dshr-org-7999 162 6 by by IN blog-dshr-org-7999 162 7 the the DT blog-dshr-org-7999 162 8 boxes box NNS blog-dshr-org-7999 162 9 themselves -PRON- PRP blog-dshr-org-7999 162 10 , , , blog-dshr-org-7999 162 11 but but CC blog-dshr-org-7999 162 12 is be VBZ blog-dshr-org-7999 162 13 asynchronous asynchronous JJ blog-dshr-org-7999 162 14 to to TO blog-dshr-org-7999 162 15 Web web NN blog-dshr-org-7999 162 16 content content NN blog-dshr-org-7999 162 17 delivery delivery NN blog-dshr-org-7999 162 18 , , , blog-dshr-org-7999 162 19 so so RB blog-dshr-org-7999 162 20 denial denial NN blog-dshr-org-7999 162 21 of of IN blog-dshr-org-7999 162 22 service service NN blog-dshr-org-7999 162 23 against against IN blog-dshr-org-7999 162 24 the the DT blog-dshr-org-7999 162 25 boxes box NNS blog-dshr-org-7999 162 26 can can MD blog-dshr-org-7999 162 27 not not RB blog-dshr-org-7999 162 28 prevent prevent VB blog-dshr-org-7999 162 29 clients client NNS blog-dshr-org-7999 162 30 obtaining obtain VBG blog-dshr-org-7999 162 31 service service NN blog-dshr-org-7999 162 32 . . . blog-dshr-org-7999 163 1 Sustained sustain VBN blog-dshr-org-7999 163 2 over over IN blog-dshr-org-7999 163 3 long long JJ blog-dshr-org-7999 163 4 periods period NNS blog-dshr-org-7999 163 5 it -PRON- PRP blog-dshr-org-7999 163 6 would would MD blog-dshr-org-7999 163 7 gradually gradually RB blog-dshr-org-7999 163 8 decrease decrease VB blog-dshr-org-7999 163 9 clients client NNS blog-dshr-org-7999 163 10 ' ' POS blog-dshr-org-7999 163 11 confidence confidence NN blog-dshr-org-7999 163 12 in in IN blog-dshr-org-7999 163 13 the the DT blog-dshr-org-7999 163 14 preserved preserve VBN blog-dshr-org-7999 163 15 Web web NN blog-dshr-org-7999 163 16 content content NN blog-dshr-org-7999 163 17 . . . blog-dshr-org-7999 164 1 A a DT blog-dshr-org-7999 164 2 decade decade NN blog-dshr-org-7999 164 3 later later RB blog-dshr-org-7999 164 4 , , , blog-dshr-org-7999 164 5 Wendlandt Wendlandt NNP blog-dshr-org-7999 164 6 et et NNP blog-dshr-org-7999 164 7 al al NNP blog-dshr-org-7999 164 8 's 's POS blog-dshr-org-7999 164 9 Perspectives Perspectives NNPS blog-dshr-org-7999 164 10 : : : blog-dshr-org-7999 164 11 Improving improve VBG blog-dshr-org-7999 164 12 SSH SSH NNP blog-dshr-org-7999 164 13 - - HYPH blog-dshr-org-7999 164 14 style style NN blog-dshr-org-7999 164 15 Host Host NNP blog-dshr-org-7999 164 16 Authentication Authentication NNP blog-dshr-org-7999 164 17 with with IN blog-dshr-org-7999 164 18 Multi Multi NNP blog-dshr-org-7999 164 19 - - NNP blog-dshr-org-7999 164 20 Path Path NNP blog-dshr-org-7999 164 21 Probing Probing NNP blog-dshr-org-7999 164 22 applied apply VBD blog-dshr-org-7999 164 23 similar similar JJ blog-dshr-org-7999 164 24 " " `` blog-dshr-org-7999 164 25 voting vote VBG blog-dshr-org-7999 164 26 among among IN blog-dshr-org-7999 164 27 a a DT blog-dshr-org-7999 164 28 sample sample NN blog-dshr-org-7999 164 29 " " `` blog-dshr-org-7999 164 30 techniques technique NNS blog-dshr-org-7999 164 31 to to IN blog-dshr-org-7999 164 32 the the DT blog-dshr-org-7999 164 33 certificate certificate NN blog-dshr-org-7999 164 34 problem problem NN blog-dshr-org-7999 164 35 : : : blog-dshr-org-7999 164 36 Our -PRON- PRP$ blog-dshr-org-7999 164 37 system system NN blog-dshr-org-7999 164 38 , , , blog-dshr-org-7999 164 39 PERSPECTIVES perspectives NN blog-dshr-org-7999 164 40 , , , blog-dshr-org-7999 164 41 thwarts thwart VBZ blog-dshr-org-7999 164 42 many many JJ blog-dshr-org-7999 164 43 of of IN blog-dshr-org-7999 164 44 these these DT blog-dshr-org-7999 164 45 attacks attack NNS blog-dshr-org-7999 164 46 by by IN blog-dshr-org-7999 164 47 using use VBG blog-dshr-org-7999 164 48 a a DT blog-dshr-org-7999 164 49 collection collection NN blog-dshr-org-7999 164 50 of of IN blog-dshr-org-7999 164 51 “ " `` blog-dshr-org-7999 164 52 notary notary JJ blog-dshr-org-7999 164 53 ” " '' blog-dshr-org-7999 164 54 hosts host NNS blog-dshr-org-7999 164 55 that that WDT blog-dshr-org-7999 164 56 observes observe VBZ blog-dshr-org-7999 164 57 a a DT blog-dshr-org-7999 164 58 server server NN blog-dshr-org-7999 164 59 ’s ’s POS blog-dshr-org-7999 164 60 public public JJ blog-dshr-org-7999 164 61 key key NN blog-dshr-org-7999 164 62 via via IN blog-dshr-org-7999 164 63 multiple multiple JJ blog-dshr-org-7999 164 64 network network NN blog-dshr-org-7999 164 65 vantage vantage NN blog-dshr-org-7999 164 66 points point NNS blog-dshr-org-7999 164 67 ( ( -LRB- blog-dshr-org-7999 164 68 detecting detect VBG blog-dshr-org-7999 164 69 localized localize VBN blog-dshr-org-7999 164 70 attacks attack NNS blog-dshr-org-7999 164 71 ) ) -RRB- blog-dshr-org-7999 164 72 and and CC blog-dshr-org-7999 164 73 keeps keep VBZ blog-dshr-org-7999 164 74 a a DT blog-dshr-org-7999 164 75 record record NN blog-dshr-org-7999 164 76 of of IN blog-dshr-org-7999 164 77 the the DT blog-dshr-org-7999 164 78 server server NN blog-dshr-org-7999 164 79 ’s ’s POS blog-dshr-org-7999 164 80 key key NN blog-dshr-org-7999 164 81 over over IN blog-dshr-org-7999 164 82 time time NN blog-dshr-org-7999 164 83 ( ( -LRB- blog-dshr-org-7999 164 84 recognizing recognize VBG blog-dshr-org-7999 164 85 short short RB blog-dshr-org-7999 164 86 - - HYPH blog-dshr-org-7999 164 87 lived live VBN blog-dshr-org-7999 164 88 attacks attack NNS blog-dshr-org-7999 164 89 ) ) -RRB- blog-dshr-org-7999 164 90 . . . blog-dshr-org-7999 165 1 Clients client NNS blog-dshr-org-7999 165 2 can can MD blog-dshr-org-7999 165 3 download download VB blog-dshr-org-7999 165 4 these these DT blog-dshr-org-7999 165 5 records record NNS blog-dshr-org-7999 165 6 on on IN blog-dshr-org-7999 165 7 - - HYPH blog-dshr-org-7999 165 8 demand demand NN blog-dshr-org-7999 165 9 and and CC blog-dshr-org-7999 165 10 compare compare VB blog-dshr-org-7999 165 11 them -PRON- PRP blog-dshr-org-7999 165 12 against against IN blog-dshr-org-7999 165 13 an an DT blog-dshr-org-7999 165 14 unauthenticated unauthenticated JJ blog-dshr-org-7999 165 15 key key NN blog-dshr-org-7999 165 16 , , , blog-dshr-org-7999 165 17 detecting detect VBG blog-dshr-org-7999 165 18 many many JJ blog-dshr-org-7999 165 19 common common JJ blog-dshr-org-7999 165 20 attacks attack NNS blog-dshr-org-7999 165 21 . . . blog-dshr-org-7999 166 1 It -PRON- PRP blog-dshr-org-7999 166 2 is be VBZ blog-dshr-org-7999 166 3 important important JJ blog-dshr-org-7999 166 4 to to TO blog-dshr-org-7999 166 5 protect protect VB blog-dshr-org-7999 166 6 against against IN blog-dshr-org-7999 166 7 compromised compromised JJ blog-dshr-org-7999 166 8 or or CC blog-dshr-org-7999 166 9 malign malign NN blog-dshr-org-7999 166 10 notaries notary NNS blog-dshr-org-7999 166 11 , , , blog-dshr-org-7999 166 12 and and CC blog-dshr-org-7999 166 13 this this DT blog-dshr-org-7999 166 14 is be VBZ blog-dshr-org-7999 166 15 where where WRB blog-dshr-org-7999 166 16 LOCKSS LOCKSS NNP blog-dshr-org-7999 166 17 - - HYPH blog-dshr-org-7999 166 18 style style NN blog-dshr-org-7999 166 19 " " '' blog-dshr-org-7999 166 20 voting vote VBG blog-dshr-org-7999 166 21 among among IN blog-dshr-org-7999 166 22 a a DT blog-dshr-org-7999 166 23 sample sample NN blog-dshr-org-7999 166 24 " " `` blog-dshr-org-7999 166 25 comes come VBZ blog-dshr-org-7999 166 26 in in RB blog-dshr-org-7999 166 27 : : : blog-dshr-org-7999 166 28 The the DT blog-dshr-org-7999 166 29 final final JJ blog-dshr-org-7999 166 30 aspect aspect NN blog-dshr-org-7999 166 31 of of IN blog-dshr-org-7999 166 32 the the DT blog-dshr-org-7999 166 33 notary notary JJ blog-dshr-org-7999 166 34 design design NN blog-dshr-org-7999 166 35 is be VBZ blog-dshr-org-7999 166 36 data datum NNS blog-dshr-org-7999 166 37 redundancy redundancy NN blog-dshr-org-7999 166 38 , , , blog-dshr-org-7999 166 39 a a DT blog-dshr-org-7999 166 40 cross cross NN blog-dshr-org-7999 166 41 - - JJ blog-dshr-org-7999 166 42 validation validation JJ blog-dshr-org-7999 166 43 mechanism mechanism NN blog-dshr-org-7999 166 44 that that WDT blog-dshr-org-7999 166 45 limits limit VBZ blog-dshr-org-7999 166 46 the the DT blog-dshr-org-7999 166 47 power power NN blog-dshr-org-7999 166 48 of of IN blog-dshr-org-7999 166 49 a a DT blog-dshr-org-7999 166 50 compromised compromised JJ blog-dshr-org-7999 166 51 or or CC blog-dshr-org-7999 166 52 otherwise otherwise RB blog-dshr-org-7999 166 53 malicious malicious JJ blog-dshr-org-7999 166 54 notary notary JJ blog-dshr-org-7999 166 55 server server NN blog-dshr-org-7999 166 56 . . . blog-dshr-org-7999 167 1 To to TO blog-dshr-org-7999 167 2 implement implement VB blog-dshr-org-7999 167 3 data datum NNS blog-dshr-org-7999 167 4 redundancy redundancy NN blog-dshr-org-7999 167 5 each each DT blog-dshr-org-7999 167 6 notary notary JJ blog-dshr-org-7999 167 7 acts act VBZ blog-dshr-org-7999 167 8 as as IN blog-dshr-org-7999 167 9 a a DT blog-dshr-org-7999 167 10 shadow shadow NN blog-dshr-org-7999 167 11 server server NN blog-dshr-org-7999 167 12 for for IN blog-dshr-org-7999 167 13 several several JJ blog-dshr-org-7999 167 14 other other JJ blog-dshr-org-7999 167 15 notaries notary NNS blog-dshr-org-7999 167 16 . . . blog-dshr-org-7999 168 1 As as IN blog-dshr-org-7999 168 2 described describe VBN blog-dshr-org-7999 168 3 below below RB blog-dshr-org-7999 168 4 , , , blog-dshr-org-7999 168 5 a a DT blog-dshr-org-7999 168 6 shadow shadow NN blog-dshr-org-7999 168 7 server server NN blog-dshr-org-7999 168 8 stores store VBZ blog-dshr-org-7999 168 9 an an DT blog-dshr-org-7999 168 10 immutable immutable JJ blog-dshr-org-7999 168 11 record record NN blog-dshr-org-7999 168 12 of of IN blog-dshr-org-7999 168 13 each each DT blog-dshr-org-7999 168 14 observation observation NN blog-dshr-org-7999 168 15 made make VBN blog-dshr-org-7999 168 16 by by IN blog-dshr-org-7999 168 17 another another DT blog-dshr-org-7999 168 18 notary notary JJ blog-dshr-org-7999 168 19 . . . blog-dshr-org-7999 169 1 Whenever whenever WRB blog-dshr-org-7999 169 2 a a DT blog-dshr-org-7999 169 3 client client NN blog-dshr-org-7999 169 4 receives receive VBZ blog-dshr-org-7999 169 5 a a DT blog-dshr-org-7999 169 6 query query NN blog-dshr-org-7999 169 7 reply reply NN blog-dshr-org-7999 169 8 from from IN blog-dshr-org-7999 169 9 a a DT blog-dshr-org-7999 169 10 notary notary JJ blog-dshr-org-7999 169 11 , , , blog-dshr-org-7999 169 12 the the DT blog-dshr-org-7999 169 13 client client NN blog-dshr-org-7999 169 14 also also RB blog-dshr-org-7999 169 15 checks check VBZ blog-dshr-org-7999 169 16 with with IN blog-dshr-org-7999 169 17 one one CD blog-dshr-org-7999 169 18 or or CC blog-dshr-org-7999 169 19 more more JJR blog-dshr-org-7999 169 20 of of IN blog-dshr-org-7999 169 21 that that DT blog-dshr-org-7999 169 22 notary notary NNP blog-dshr-org-7999 169 23 ’s ’s POS blog-dshr-org-7999 169 24 shadow shadow NN blog-dshr-org-7999 169 25 servers server NNS blog-dshr-org-7999 169 26 to to TO blog-dshr-org-7999 169 27 make make VB blog-dshr-org-7999 169 28 sure sure JJ blog-dshr-org-7999 169 29 that that IN blog-dshr-org-7999 169 30 the the DT blog-dshr-org-7999 169 31 notary notary JJ blog-dshr-org-7999 169 32 reply reply NN blog-dshr-org-7999 169 33 is be VBZ blog-dshr-org-7999 169 34 consistent consistent JJ blog-dshr-org-7999 169 35 with with IN blog-dshr-org-7999 169 36 the the DT blog-dshr-org-7999 169 37 history history NN blog-dshr-org-7999 169 38 stored store VBN blog-dshr-org-7999 169 39 by by IN blog-dshr-org-7999 169 40 the the DT blog-dshr-org-7999 169 41 shadow shadow NN blog-dshr-org-7999 169 42 server server NN blog-dshr-org-7999 169 43 . . . blog-dshr-org-7999 170 1 Just just RB blog-dshr-org-7999 170 2 as as IN blog-dshr-org-7999 170 3 in in IN blog-dshr-org-7999 170 4 the the DT blog-dshr-org-7999 170 5 LOCKSS LOCKSS NNP blog-dshr-org-7999 170 6 system system NN blog-dshr-org-7999 170 7 , , , blog-dshr-org-7999 170 8 if if IN blog-dshr-org-7999 170 9 there there EX blog-dshr-org-7999 170 10 are be VBP blog-dshr-org-7999 170 11 enough enough JJ blog-dshr-org-7999 170 12 notaries notary NNS blog-dshr-org-7999 170 13 and and CC blog-dshr-org-7999 170 14 enough enough JJ blog-dshr-org-7999 170 15 shadow shadow NN blog-dshr-org-7999 170 16 servers server NNS blog-dshr-org-7999 170 17 the the DT blog-dshr-org-7999 170 18 bad bad JJ blog-dshr-org-7999 170 19 guy guy NN blog-dshr-org-7999 170 20 ca can MD blog-dshr-org-7999 170 21 n't not RB blog-dshr-org-7999 170 22 know know VB blog-dshr-org-7999 170 23 which which WDT blog-dshr-org-7999 170 24 notaries notarie VBZ blog-dshr-org-7999 170 25 the the DT blog-dshr-org-7999 170 26 client client NN blog-dshr-org-7999 170 27 will will MD blog-dshr-org-7999 170 28 ask ask VB blog-dshr-org-7999 170 29 , , , blog-dshr-org-7999 170 30 and and CC blog-dshr-org-7999 170 31 which which WDT blog-dshr-org-7999 170 32 shadow shadow NN blog-dshr-org-7999 170 33 servers server VBZ blog-dshr-org-7999 170 34 the the DT blog-dshr-org-7999 170 35 client client NN blog-dshr-org-7999 170 36 will will MD blog-dshr-org-7999 170 37 ask ask VB blog-dshr-org-7999 170 38 to to TO blog-dshr-org-7999 170 39 vote vote VB blog-dshr-org-7999 170 40 on on IN blog-dshr-org-7999 170 41 the the DT blog-dshr-org-7999 170 42 replies reply NNS blog-dshr-org-7999 170 43 . . . blog-dshr-org-7999 171 1 Posted post VBN blog-dshr-org-7999 171 2 by by IN blog-dshr-org-7999 171 3 David David NNP blog-dshr-org-7999 171 4 . . . blog-dshr-org-7999 172 1 at at IN blog-dshr-org-7999 172 2 8:00 8:00 CD blog-dshr-org-7999 172 3 AM AM NNP blog-dshr-org-7999 172 4 Labels Labels NNPS blog-dshr-org-7999 172 5 : : : blog-dshr-org-7999 172 6 bitcoin bitcoin NN blog-dshr-org-7999 172 7 , , , blog-dshr-org-7999 172 8 digital digital JJ blog-dshr-org-7999 172 9 preservation preservation NN blog-dshr-org-7999 172 10 , , , blog-dshr-org-7999 172 11 security security NN blog-dshr-org-7999 172 12 , , , blog-dshr-org-7999 172 13 web web NN blog-dshr-org-7999 172 14 archiving archive VBG blog-dshr-org-7999 172 15 2 2 CD blog-dshr-org-7999 172 16 comments comment NNS blog-dshr-org-7999 172 17 : : : blog-dshr-org-7999 172 18 David David NNP blog-dshr-org-7999 172 19 . . . blog-dshr-org-7999 173 1 said say VBD blog-dshr-org-7999 173 2 ... ... : blog-dshr-org-7999 173 3 Tim Tim NNP blog-dshr-org-7999 173 4 Anderson Anderson NNP blog-dshr-org-7999 173 5 's 's POS blog-dshr-org-7999 173 6 Google Google NNP blog-dshr-org-7999 173 7 to to TO blog-dshr-org-7999 173 8 bury bury VB blog-dshr-org-7999 173 9 indicator indicator NN blog-dshr-org-7999 173 10 for for IN blog-dshr-org-7999 173 11 Extended extend VBN blog-dshr-org-7999 173 12 Validation validation NN blog-dshr-org-7999 173 13 certs cert NNS blog-dshr-org-7999 173 14 in in IN blog-dshr-org-7999 173 15 Chrome Chrome NNP blog-dshr-org-7999 173 16 because because IN blog-dshr-org-7999 173 17 users user NNS blog-dshr-org-7999 173 18 barely barely RB blog-dshr-org-7999 173 19 took take VBD blog-dshr-org-7999 173 20 notice notice NN blog-dshr-org-7999 173 21 reports report VBZ blog-dshr-org-7999 173 22 that that IN blog-dshr-org-7999 173 23 , , , blog-dshr-org-7999 173 24 as as IN blog-dshr-org-7999 173 25 Troy Troy NNP blog-dshr-org-7999 173 26 Hunt Hunt NNP blog-dshr-org-7999 173 27 tweeted tweet VBD blog-dshr-org-7999 173 28 : : : blog-dshr-org-7999 173 29 " " `` blog-dshr-org-7999 173 30 And and CC blog-dshr-org-7999 173 31 that that DT blog-dshr-org-7999 173 32 ’s ’ VBZ blog-dshr-org-7999 173 33 that that DT blog-dshr-org-7999 173 34 - - : blog-dshr-org-7999 173 35 for for IN blog-dshr-org-7999 173 36 all all DT blog-dshr-org-7999 173 37 intents intent NNS blog-dshr-org-7999 173 38 and and CC blog-dshr-org-7999 173 39 purposes purpose NNS blog-dshr-org-7999 173 40 , , , blog-dshr-org-7999 173 41 EV EV NNP blog-dshr-org-7999 173 42 is be VBZ blog-dshr-org-7999 173 43 now now RB blog-dshr-org-7999 173 44 dead dead JJ blog-dshr-org-7999 173 45 : : : blog-dshr-org-7999 173 46 “ " `` blog-dshr-org-7999 173 47 the the DT blog-dshr-org-7999 173 48 Chrome Chrome NNP blog-dshr-org-7999 173 49 Security Security NNP blog-dshr-org-7999 173 50 UX UX NNP blog-dshr-org-7999 173 51 team team NN blog-dshr-org-7999 173 52 has have VBZ blog-dshr-org-7999 173 53 determined determine VBN blog-dshr-org-7999 173 54 that that IN blog-dshr-org-7999 173 55 the the DT blog-dshr-org-7999 173 56 EV EV NNP blog-dshr-org-7999 173 57 UI UI NNP blog-dshr-org-7999 173 58 does do VBZ blog-dshr-org-7999 173 59 not not RB blog-dshr-org-7999 173 60 protect protect VB blog-dshr-org-7999 173 61 users user NNS blog-dshr-org-7999 173 62 as as IN blog-dshr-org-7999 173 63 intended intend VBN blog-dshr-org-7999 173 64 ” " '' blog-dshr-org-7999 173 65 https://t.co/W7kCKCCJR8 https://t.co/W7kCKCCJR8 NNP blog-dshr-org-7999 173 66 " " '' blog-dshr-org-7999 173 67 There there EX blog-dshr-org-7999 173 68 are be VBP blog-dshr-org-7999 173 69 two two CD blog-dshr-org-7999 173 70 reasons reason NNS blog-dshr-org-7999 173 71 for for IN blog-dshr-org-7999 173 72 its -PRON- PRP$ blog-dshr-org-7999 173 73 demise demise NN blog-dshr-org-7999 173 74 . . . blog-dshr-org-7999 174 1 The the DT blog-dshr-org-7999 174 2 one one CD blog-dshr-org-7999 174 3 Anderson Anderson NNP blog-dshr-org-7999 174 4 points point VBZ blog-dshr-org-7999 174 5 to to TO blog-dshr-org-7999 174 6 is be VBZ blog-dshr-org-7999 174 7 : : : blog-dshr-org-7999 174 8 " " `` blog-dshr-org-7999 174 9 The the DT blog-dshr-org-7999 174 10 team team NN blog-dshr-org-7999 174 11 have have VBP blog-dshr-org-7999 174 12 concluded conclude VBN blog-dshr-org-7999 174 13 that that IN blog-dshr-org-7999 174 14 positive positive JJ blog-dshr-org-7999 174 15 security security NN blog-dshr-org-7999 174 16 indicators indicator NNS blog-dshr-org-7999 174 17 are be VBP blog-dshr-org-7999 174 18 largely largely RB blog-dshr-org-7999 174 19 ineffective ineffective JJ blog-dshr-org-7999 174 20 . . . blog-dshr-org-7999 175 1 The the DT blog-dshr-org-7999 175 2 direction direction NN blog-dshr-org-7999 175 3 for for IN blog-dshr-org-7999 175 4 Chrome Chrome NNP blog-dshr-org-7999 175 5 will will MD blog-dshr-org-7999 175 6 be be VB blog-dshr-org-7999 175 7 to to TO blog-dshr-org-7999 175 8 highlight highlight VB blog-dshr-org-7999 175 9 negative negative JJ blog-dshr-org-7999 175 10 indicators indicator NNS blog-dshr-org-7999 175 11 like like IN blog-dshr-org-7999 175 12 unencrypted unencrypted JJ blog-dshr-org-7999 175 13 ( ( -LRB- blog-dshr-org-7999 175 14 HTTP HTTP NNP blog-dshr-org-7999 175 15 ) ) -RRB- blog-dshr-org-7999 175 16 connections connection NNS blog-dshr-org-7999 175 17 , , , blog-dshr-org-7999 175 18 which which WDT blog-dshr-org-7999 175 19 are be VBP blog-dshr-org-7999 175 20 marked mark VBN blog-dshr-org-7999 175 21 as as IN blog-dshr-org-7999 175 22 " " `` blog-dshr-org-7999 175 23 not not RB blog-dshr-org-7999 175 24 secure secure JJ blog-dshr-org-7999 175 25 " " '' blog-dshr-org-7999 175 26 , , , blog-dshr-org-7999 175 27 rather rather RB blog-dshr-org-7999 175 28 than than IN blog-dshr-org-7999 175 29 emphasise emphasise VB blog-dshr-org-7999 175 30 when when WRB blog-dshr-org-7999 175 31 a a DT blog-dshr-org-7999 175 32 connection connection NN blog-dshr-org-7999 175 33 is be VBZ blog-dshr-org-7999 175 34 secure secure JJ blog-dshr-org-7999 175 35 . . . blog-dshr-org-7999 175 36 " " '' blog-dshr-org-7999 176 1 The the DT blog-dshr-org-7999 176 2 other other JJ blog-dshr-org-7999 176 3 one one CD blog-dshr-org-7999 176 4 is be VBZ blog-dshr-org-7999 176 5 that that IN blog-dshr-org-7999 176 6 , , , blog-dshr-org-7999 176 7 because because IN blog-dshr-org-7999 176 8 Certificate Certificate NNP blog-dshr-org-7999 176 9 Authorities Authorities NNPS blog-dshr-org-7999 176 10 have have VBP blog-dshr-org-7999 176 11 a a DT blog-dshr-org-7999 176 12 long long JJ blog-dshr-org-7999 176 13 history history NN blog-dshr-org-7999 176 14 of of IN blog-dshr-org-7999 176 15 abusing abuse VBG blog-dshr-org-7999 176 16 their -PRON- PRP$ blog-dshr-org-7999 176 17 trust trust NN blog-dshr-org-7999 176 18 , , , blog-dshr-org-7999 176 19 users user NNS blog-dshr-org-7999 176 20 are be VBP blog-dshr-org-7999 176 21 in in IN blog-dshr-org-7999 176 22 fact fact NN blog-dshr-org-7999 176 23 right right JJ blog-dshr-org-7999 176 24 to to TO blog-dshr-org-7999 176 25 place place VB blog-dshr-org-7999 176 26 little little JJ blog-dshr-org-7999 176 27 reliance reliance NN blog-dshr-org-7999 176 28 on on IN blog-dshr-org-7999 176 29 Extended Extended NNP blog-dshr-org-7999 176 30 Validation validation NN blog-dshr-org-7999 176 31 . . . blog-dshr-org-7999 177 1 As as IN blog-dshr-org-7999 177 2 Anderson Anderson NNP blog-dshr-org-7999 177 3 writes write VBZ blog-dshr-org-7999 177 4 : : : blog-dshr-org-7999 177 5 " " `` blog-dshr-org-7999 177 6 Google Google NNP blog-dshr-org-7999 177 7 's 's POS blog-dshr-org-7999 177 8 announcement announcement NN blog-dshr-org-7999 177 9 will will MD blog-dshr-org-7999 177 10 make make VB blog-dshr-org-7999 177 11 it -PRON- PRP blog-dshr-org-7999 177 12 harder hard JJR blog-dshr-org-7999 177 13 for for IN blog-dshr-org-7999 177 14 certificate certificate NN blog-dshr-org-7999 177 15 providers provider NNS blog-dshr-org-7999 177 16 to to TO blog-dshr-org-7999 177 17 market market VB blog-dshr-org-7999 177 18 EV ev NN blog-dshr-org-7999 177 19 certificates certificate NNS blog-dshr-org-7999 177 20 . . . blog-dshr-org-7999 178 1 This this DT blog-dshr-org-7999 178 2 is be VBZ blog-dshr-org-7999 178 3 also also RB blog-dshr-org-7999 178 4 another another DT blog-dshr-org-7999 178 5 reason reason NN blog-dshr-org-7999 178 6 why why WRB blog-dshr-org-7999 178 7 you -PRON- PRP blog-dshr-org-7999 178 8 might may MD blog-dshr-org-7999 178 9 just just RB blog-dshr-org-7999 178 10 as as RB blog-dshr-org-7999 178 11 well well RB blog-dshr-org-7999 178 12 use use VB blog-dshr-org-7999 178 13 free free JJ blog-dshr-org-7999 178 14 Let let NN blog-dshr-org-7999 178 15 ’s -PRON- PRP blog-dshr-org-7999 178 16 Encrypt Encrypt NNP blog-dshr-org-7999 178 17 certificates certificate NNS blog-dshr-org-7999 178 18 – – : blog-dshr-org-7999 178 19 no no DT blog-dshr-org-7999 178 20 EV ev NN blog-dshr-org-7999 178 21 from from IN blog-dshr-org-7999 178 22 Let let NNP blog-dshr-org-7999 178 23 's -PRON- POS blog-dshr-org-7999 178 24 Encrypt Encrypt NNP blog-dshr-org-7999 178 25 , , , blog-dshr-org-7999 178 26 but but CC blog-dshr-org-7999 178 27 it -PRON- PRP blog-dshr-org-7999 178 28 no no RB blog-dshr-org-7999 178 29 longer long RBR blog-dshr-org-7999 178 30 matters matter VBZ blog-dshr-org-7999 178 31 . . . blog-dshr-org-7999 178 32 " " '' blog-dshr-org-7999 179 1 The the DT blog-dshr-org-7999 179 2 CAs CAs NNP blog-dshr-org-7999 179 3 bought buy VBD blog-dshr-org-7999 179 4 this this DT blog-dshr-org-7999 179 5 on on IN blog-dshr-org-7999 179 6 themselves -PRON- PRP blog-dshr-org-7999 179 7 , , , blog-dshr-org-7999 179 8 and and CC blog-dshr-org-7999 179 9 it -PRON- PRP blog-dshr-org-7999 179 10 could could MD blog-dshr-org-7999 179 11 n't not RB blog-dshr-org-7999 179 12 happen happen VB blog-dshr-org-7999 179 13 to to IN blog-dshr-org-7999 179 14 a a DT blog-dshr-org-7999 179 15 better well JJR blog-dshr-org-7999 179 16 bunch bunch NN blog-dshr-org-7999 179 17 of of IN blog-dshr-org-7999 179 18 crooks crook NNS blog-dshr-org-7999 179 19 . . . blog-dshr-org-7999 180 1 And and CC blog-dshr-org-7999 180 2 there there EX blog-dshr-org-7999 180 3 's be VBZ blog-dshr-org-7999 180 4 more more JJR blog-dshr-org-7999 180 5 ! ! . blog-dshr-org-7999 181 1 Shaun Shaun NNP blog-dshr-org-7999 181 2 Nichols Nichols NNP blog-dshr-org-7999 181 3 reports report VBZ blog-dshr-org-7999 181 4 that that IN blog-dshr-org-7999 181 5 Web web NN blog-dshr-org-7999 181 6 body body NN blog-dshr-org-7999 181 7 mulls mull VBZ blog-dshr-org-7999 181 8 halving halve VBG blog-dshr-org-7999 181 9 HTTPS HTTPS NNP blog-dshr-org-7999 181 10 cert cert NN blog-dshr-org-7999 181 11 lifetimes lifetime NNS blog-dshr-org-7999 181 12 . . . blog-dshr-org-7999 182 1 That that DT blog-dshr-org-7999 182 2 screaming scream VBG blog-dshr-org-7999 182 3 in in IN blog-dshr-org-7999 182 4 the the DT blog-dshr-org-7999 182 5 distance distance NN blog-dshr-org-7999 182 6 is be VBZ blog-dshr-org-7999 182 7 HTTPS HTTPS NNP blog-dshr-org-7999 182 8 cert cert NN blog-dshr-org-7999 182 9 sellers seller NNS blog-dshr-org-7999 182 10 fearing fear VBG blog-dshr-org-7999 182 11 orgs org NNS blog-dshr-org-7999 182 12 will will MD blog-dshr-org-7999 182 13 bail bail VB blog-dshr-org-7999 182 14 for for IN blog-dshr-org-7999 182 15 Let let NNP blog-dshr-org-7999 182 16 's -PRON- PRP blog-dshr-org-7999 182 17 Encrypt Encrypt NNP blog-dshr-org-7999 182 18 : : : blog-dshr-org-7999 182 19 " " `` blog-dshr-org-7999 182 20 CA CA NNP blog-dshr-org-7999 182 21 / / SYM blog-dshr-org-7999 182 22 Browser Browser NNP blog-dshr-org-7999 182 23 Forum Forum NNP blog-dshr-org-7999 182 24 – – : blog-dshr-org-7999 182 25 an an DT blog-dshr-org-7999 182 26 industry industry NN blog-dshr-org-7999 182 27 body body NN blog-dshr-org-7999 182 28 of of IN blog-dshr-org-7999 182 29 web web NN blog-dshr-org-7999 182 30 browser browser NN blog-dshr-org-7999 182 31 makers maker NNS blog-dshr-org-7999 182 32 , , , blog-dshr-org-7999 182 33 software software NN blog-dshr-org-7999 182 34 developers developer NNS blog-dshr-org-7999 182 35 , , , blog-dshr-org-7999 182 36 and and CC blog-dshr-org-7999 182 37 security security NN blog-dshr-org-7999 182 38 certificate certificate NN blog-dshr-org-7999 182 39 issuers issuer NNS blog-dshr-org-7999 182 40 – – : blog-dshr-org-7999 182 41 is be VBZ blog-dshr-org-7999 182 42 considering consider VBG blog-dshr-org-7999 182 43 slashing slash VBG blog-dshr-org-7999 182 44 the the DT blog-dshr-org-7999 182 45 lifetime lifetime NN blog-dshr-org-7999 182 46 of of IN blog-dshr-org-7999 182 47 HTTPS HTTPS NNP blog-dshr-org-7999 182 48 certs cert NNS blog-dshr-org-7999 182 49 from from IN blog-dshr-org-7999 182 50 27 27 CD blog-dshr-org-7999 182 51 months month NNS blog-dshr-org-7999 182 52 to to IN blog-dshr-org-7999 182 53 13 13 CD blog-dshr-org-7999 182 54 months month NNS blog-dshr-org-7999 182 55 . . . blog-dshr-org-7999 183 1 ... ... NFP blog-dshr-org-7999 183 2 slashing slash VBG blog-dshr-org-7999 183 3 the the DT blog-dshr-org-7999 183 4 lifetime lifetime NN blog-dshr-org-7999 183 5 may may MD blog-dshr-org-7999 183 6 drive drive VB blog-dshr-org-7999 183 7 organizations organization NNS blog-dshr-org-7999 183 8 into into IN blog-dshr-org-7999 183 9 using use VBG blog-dshr-org-7999 183 10 Let let VB blog-dshr-org-7999 183 11 's -PRON- PRP blog-dshr-org-7999 183 12 Encrypt Encrypt NNP blog-dshr-org-7999 183 13 for for IN blog-dshr-org-7999 183 14 free free JJ blog-dshr-org-7999 183 15 , , , blog-dshr-org-7999 183 16 rather rather RB blog-dshr-org-7999 183 17 than than IN blog-dshr-org-7999 183 18 encourage encourage VB blog-dshr-org-7999 183 19 them -PRON- PRP blog-dshr-org-7999 183 20 to to TO blog-dshr-org-7999 183 21 cough cough VB blog-dshr-org-7999 183 22 up up RP blog-dshr-org-7999 183 23 payment payment NN blog-dshr-org-7999 183 24 more more RBR blog-dshr-org-7999 183 25 regularly regularly RB blog-dshr-org-7999 183 26 to to IN blog-dshr-org-7999 183 27 outfits outfit NNS blog-dshr-org-7999 183 28 like like IN blog-dshr-org-7999 183 29 Digicert Digicert NNP blog-dshr-org-7999 183 30 . . . blog-dshr-org-7999 184 1 Digicert Digicert NNP blog-dshr-org-7999 184 2 and and CC blog-dshr-org-7999 184 3 its -PRON- PRP$ blog-dshr-org-7999 184 4 ilk ilk NN blog-dshr-org-7999 184 5 charge charge NN blog-dshr-org-7999 184 6 , , , blog-dshr-org-7999 184 7 typically typically RB blog-dshr-org-7999 184 8 , , , blog-dshr-org-7999 184 9 hundreds hundred NNS blog-dshr-org-7999 184 10 of of IN blog-dshr-org-7999 184 11 dollars dollar NNS blog-dshr-org-7999 184 12 for for IN blog-dshr-org-7999 184 13 their -PRON- PRP$ blog-dshr-org-7999 184 14 certs cert NNS blog-dshr-org-7999 184 15 : : : blog-dshr-org-7999 184 16 forcing force VBG blog-dshr-org-7999 184 17 customers customer NNS blog-dshr-org-7999 184 18 to to TO blog-dshr-org-7999 184 19 fork fork VB blog-dshr-org-7999 184 20 out out RP blog-dshr-org-7999 184 21 more more RBR blog-dshr-org-7999 184 22 often often RB blog-dshr-org-7999 184 23 may may MD blog-dshr-org-7999 184 24 be be VB blog-dshr-org-7999 184 25 more more JJR blog-dshr-org-7999 184 26 of of IN blog-dshr-org-7999 184 27 a a DT blog-dshr-org-7999 184 28 turn turn NN blog-dshr-org-7999 184 29 off off RP blog-dshr-org-7999 184 30 than than IN blog-dshr-org-7999 184 31 a a DT blog-dshr-org-7999 184 32 money money NN blog-dshr-org-7999 184 33 spinner spinner NN blog-dshr-org-7999 184 34 . . . blog-dshr-org-7999 184 35 " " '' blog-dshr-org-7999 185 1 August August NNP blog-dshr-org-7999 185 2 13 13 CD blog-dshr-org-7999 185 3 , , , blog-dshr-org-7999 185 4 2019 2019 CD blog-dshr-org-7999 185 5 at at IN blog-dshr-org-7999 185 6 9:47 9:47 CD blog-dshr-org-7999 185 7 AM am NN blog-dshr-org-7999 185 8 David David NNP blog-dshr-org-7999 185 9 . . . blog-dshr-org-7999 186 1 said say VBD blog-dshr-org-7999 186 2 ... ... : blog-dshr-org-7999 186 3 Cory Cory NNP blog-dshr-org-7999 186 4 Doctorow Doctorow NNP blog-dshr-org-7999 186 5 writes write VBZ blog-dshr-org-7999 186 6 in in IN blog-dshr-org-7999 186 7 Creating create VBG blog-dshr-org-7999 186 8 a a DT blog-dshr-org-7999 186 9 " " `` blog-dshr-org-7999 186 10 coercion coercion NN blog-dshr-org-7999 186 11 resistant resistant JJ blog-dshr-org-7999 186 12 " " '' blog-dshr-org-7999 186 13 communications communication NNS blog-dshr-org-7999 186 14 system system NN blog-dshr-org-7999 186 15 : : : blog-dshr-org-7999 186 16 " " `` blog-dshr-org-7999 186 17 Eleanor Eleanor NNP blog-dshr-org-7999 186 18 Saitta Saitta NNP blog-dshr-org-7999 186 19 's 's POS blog-dshr-org-7999 186 20 ... ... : blog-dshr-org-7999 186 21 2016 2016 CD blog-dshr-org-7999 186 22 essay essay NN blog-dshr-org-7999 186 23 " " `` blog-dshr-org-7999 186 24 Coercion coercion NN blog-dshr-org-7999 186 25 - - HYPH blog-dshr-org-7999 186 26 Resistant Resistant NNP blog-dshr-org-7999 186 27 Design Design NNP blog-dshr-org-7999 186 28 " " '' blog-dshr-org-7999 186 29 ( ( -LRB- blog-dshr-org-7999 186 30 which which WDT blog-dshr-org-7999 186 31 is be VBZ blog-dshr-org-7999 186 32 new new JJ blog-dshr-org-7999 186 33 to to IN blog-dshr-org-7999 186 34 me -PRON- PRP blog-dshr-org-7999 186 35 ) ) -RRB- blog-dshr-org-7999 186 36 is be VBZ blog-dshr-org-7999 186 37 an an DT blog-dshr-org-7999 186 38 excellent excellent JJ blog-dshr-org-7999 186 39 introduction introduction NN blog-dshr-org-7999 186 40 to to IN blog-dshr-org-7999 186 41 the the DT blog-dshr-org-7999 186 42 technical technical JJ blog-dshr-org-7999 186 43 countermeasures countermeasure NNS blog-dshr-org-7999 186 44 that that WDT blog-dshr-org-7999 186 45 systems system VBZ blog-dshr-org-7999 186 46 designers designer NNS blog-dshr-org-7999 186 47 can can MD blog-dshr-org-7999 186 48 employ employ VB blog-dshr-org-7999 186 49 to to TO blog-dshr-org-7999 186 50 defeat defeat VB blog-dshr-org-7999 186 51 non non JJ blog-dshr-org-7999 186 52 - - JJ blog-dshr-org-7999 186 53 technical technical JJ blog-dshr-org-7999 186 54 , , , blog-dshr-org-7999 186 55 legal legal JJ blog-dshr-org-7999 186 56 attacks attack NNS blog-dshr-org-7999 186 57 : : : blog-dshr-org-7999 186 58 for for IN blog-dshr-org-7999 186 59 example example NN blog-dshr-org-7999 186 60 , , , blog-dshr-org-7999 186 61 the the DT blog-dshr-org-7999 186 62 threat threat NN blog-dshr-org-7999 186 63 of of IN blog-dshr-org-7999 186 64 prison prison NN blog-dshr-org-7999 186 65 if if IN blog-dshr-org-7999 186 66 you -PRON- PRP blog-dshr-org-7999 186 67 do do VBP blog-dshr-org-7999 186 68 n't not RB blog-dshr-org-7999 186 69 back back VB blog-dshr-org-7999 186 70 - - HYPH blog-dshr-org-7999 186 71 door door NN blog-dshr-org-7999 186 72 your -PRON- PRP$ blog-dshr-org-7999 186 73 product product NN blog-dshr-org-7999 186 74 . . . blog-dshr-org-7999 187 1 Saitta Saitta NNP blog-dshr-org-7999 187 2 's 's POS blog-dshr-org-7999 187 3 paper paper NN blog-dshr-org-7999 187 4 advises advise VBZ blog-dshr-org-7999 187 5 systems system NNS blog-dshr-org-7999 187 6 designers designer NNS blog-dshr-org-7999 187 7 to to TO blog-dshr-org-7999 187 8 contemplate contemplate VB blog-dshr-org-7999 187 9 ways way NNS blog-dshr-org-7999 187 10 to to TO blog-dshr-org-7999 187 11 arbitrage arbitrage VB blog-dshr-org-7999 187 12 both both CC blog-dshr-org-7999 187 13 the the DT blog-dshr-org-7999 187 14 rule rule NN blog-dshr-org-7999 187 15 of of IN blog-dshr-org-7999 187 16 law law NN blog-dshr-org-7999 187 17 and and CC blog-dshr-org-7999 187 18 technical technical JJ blog-dshr-org-7999 187 19 pre pre NNS blog-dshr-org-7999 187 20 - - NNS blog-dshr-org-7999 187 21 commitments commitment NNS blog-dshr-org-7999 187 22 to to TO blog-dshr-org-7999 187 23 make make VB blog-dshr-org-7999 187 24 it -PRON- PRP blog-dshr-org-7999 187 25 harder hard RBR blog-dshr-org-7999 187 26 for for IN blog-dshr-org-7999 187 27 governments government NNS blog-dshr-org-7999 187 28 to to TO blog-dshr-org-7999 187 29 force force VB blog-dshr-org-7999 187 30 you -PRON- PRP blog-dshr-org-7999 187 31 to to TO blog-dshr-org-7999 187 32 weaken weaken VB blog-dshr-org-7999 187 33 the the DT blog-dshr-org-7999 187 34 security security NN blog-dshr-org-7999 187 35 of of IN blog-dshr-org-7999 187 36 your -PRON- PRP$ blog-dshr-org-7999 187 37 product product NN blog-dshr-org-7999 187 38 or or CC blog-dshr-org-7999 187 39 compromise compromise VB blog-dshr-org-7999 187 40 your -PRON- PRP$ blog-dshr-org-7999 187 41 users user NNS blog-dshr-org-7999 187 42 . . . blog-dshr-org-7999 188 1 A a DT blog-dshr-org-7999 188 2 good good JJ blog-dshr-org-7999 188 3 example example NN blog-dshr-org-7999 188 4 of of IN blog-dshr-org-7999 188 5 this this DT blog-dshr-org-7999 188 6 is be VBZ blog-dshr-org-7999 188 7 Certificate Certificate NNP blog-dshr-org-7999 188 8 Transparency Transparency NNP blog-dshr-org-7999 188 9 , , , blog-dshr-org-7999 188 10 a a DT blog-dshr-org-7999 188 11 distributed distributed JJ blog-dshr-org-7999 188 12 system system NN blog-dshr-org-7999 188 13 designed design VBN blog-dshr-org-7999 188 14 to to TO blog-dshr-org-7999 188 15 catch catch VB blog-dshr-org-7999 188 16 Certificate Certificate NNP blog-dshr-org-7999 188 17 Authorities Authorities NNPS blog-dshr-org-7999 188 18 that that WDT blog-dshr-org-7999 188 19 cheat cheat VBP blog-dshr-org-7999 188 20 and and CC blog-dshr-org-7999 188 21 issue issue VB blog-dshr-org-7999 188 22 certificates certificate NNS blog-dshr-org-7999 188 23 to to TO blog-dshr-org-7999 188 24 allow allow VB blog-dshr-org-7999 188 25 criminals criminal NNS blog-dshr-org-7999 188 26 or or CC blog-dshr-org-7999 188 27 governments government NNS blog-dshr-org-7999 188 28 to to TO blog-dshr-org-7999 188 29 impersonate impersonate VB blog-dshr-org-7999 188 30 popular popular JJ blog-dshr-org-7999 188 31 websites website NNS blog-dshr-org-7999 188 32 like like IN blog-dshr-org-7999 188 33 Google Google NNP blog-dshr-org-7999 188 34 . . . blog-dshr-org-7999 188 35 " " '' blog-dshr-org-7999 189 1 September September NNP blog-dshr-org-7999 189 2 10 10 CD blog-dshr-org-7999 189 3 , , , blog-dshr-org-7999 189 4 2019 2019 CD blog-dshr-org-7999 189 5 at at IN blog-dshr-org-7999 189 6 8:44 8:44 CD blog-dshr-org-7999 189 7 PM PM NNP blog-dshr-org-7999 189 8 Post Post NNP blog-dshr-org-7999 189 9 a a DT blog-dshr-org-7999 189 10 Comment Comment NNP blog-dshr-org-7999 189 11 Newer Newer NNP blog-dshr-org-7999 189 12 Post Post NNP blog-dshr-org-7999 189 13 Older Older NNP blog-dshr-org-7999 189 14 Post Post NNP blog-dshr-org-7999 189 15 Home Home NNP blog-dshr-org-7999 189 16 Subscribe Subscribe NNP blog-dshr-org-7999 189 17 to to TO blog-dshr-org-7999 189 18 : : : blog-dshr-org-7999 189 19 Post Post NNP blog-dshr-org-7999 189 20 Comments comment NNS blog-dshr-org-7999 189 21 ( ( -LRB- blog-dshr-org-7999 189 22 Atom atom NN blog-dshr-org-7999 189 23 ) ) -RRB- blog-dshr-org-7999 189 24 Blog Blog NNP blog-dshr-org-7999 189 25 Rules rule NNS blog-dshr-org-7999 189 26 Posts post NNS blog-dshr-org-7999 189 27 and and CC blog-dshr-org-7999 189 28 comments comment NNS blog-dshr-org-7999 189 29 are be VBP blog-dshr-org-7999 189 30 copyright copyright NN blog-dshr-org-7999 189 31 of of IN blog-dshr-org-7999 189 32 their -PRON- PRP$ blog-dshr-org-7999 189 33 respective respective JJ blog-dshr-org-7999 189 34 authors author NNS blog-dshr-org-7999 189 35 who who WP blog-dshr-org-7999 189 36 , , , blog-dshr-org-7999 189 37 by by IN blog-dshr-org-7999 189 38 posting post VBG blog-dshr-org-7999 189 39 or or CC blog-dshr-org-7999 189 40 commenting comment VBG blog-dshr-org-7999 189 41 , , , blog-dshr-org-7999 189 42 license license VBP blog-dshr-org-7999 189 43 their -PRON- PRP$ blog-dshr-org-7999 189 44 work work NN blog-dshr-org-7999 189 45 under under IN blog-dshr-org-7999 189 46 a a DT blog-dshr-org-7999 189 47 Creative Creative NNP blog-dshr-org-7999 189 48 Commons Commons NNP blog-dshr-org-7999 189 49 Attribution Attribution NNP blog-dshr-org-7999 189 50 - - HYPH blog-dshr-org-7999 189 51 Share Share NNP blog-dshr-org-7999 189 52 Alike alike RB blog-dshr-org-7999 189 53 3.0 3.0 CD blog-dshr-org-7999 189 54 United United NNP blog-dshr-org-7999 189 55 States States NNP blog-dshr-org-7999 189 56 License License NNP blog-dshr-org-7999 189 57 . . . blog-dshr-org-7999 190 1 Off off IN blog-dshr-org-7999 190 2 - - HYPH blog-dshr-org-7999 190 3 topic topic NN blog-dshr-org-7999 190 4 or or CC blog-dshr-org-7999 190 5 unsuitable unsuitable JJ blog-dshr-org-7999 190 6 comments comment NNS blog-dshr-org-7999 190 7 will will MD blog-dshr-org-7999 190 8 be be VB blog-dshr-org-7999 190 9 deleted delete VBN blog-dshr-org-7999 190 10 . . . blog-dshr-org-7999 191 1 DSHR DSHR NNP blog-dshr-org-7999 191 2 DSHR DSHR NNP blog-dshr-org-7999 191 3 in in IN blog-dshr-org-7999 191 4 ANWR ANWR NNP blog-dshr-org-7999 191 5 Recent recent JJ blog-dshr-org-7999 191 6 Comments comment NNS blog-dshr-org-7999 191 7 Full full JJ blog-dshr-org-7999 191 8 comments comment NNS blog-dshr-org-7999 191 9 Blog Blog NNP blog-dshr-org-7999 191 10 Archive Archive NNP blog-dshr-org-7999 191 11 ► ► NFP blog-dshr-org-7999 191 12     _SP blog-dshr-org-7999 191 13 2021 2021 CD blog-dshr-org-7999 191 14 ( ( -LRB- blog-dshr-org-7999 191 15 7 7 CD blog-dshr-org-7999 191 16 ) ) -RRB- blog-dshr-org-7999 191 17 ► ► NFP blog-dshr-org-7999 191 18     _SP blog-dshr-org-7999 191 19 February February NNP blog-dshr-org-7999 191 20 ( ( -LRB- blog-dshr-org-7999 191 21 2 2 CD blog-dshr-org-7999 191 22 ) ) -RRB- blog-dshr-org-7999 191 23 ► ► NFP blog-dshr-org-7999 191 24     _SP blog-dshr-org-7999 191 25 January January NNP blog-dshr-org-7999 191 26 ( ( -LRB- blog-dshr-org-7999 191 27 5 5 CD blog-dshr-org-7999 191 28 ) ) -RRB- blog-dshr-org-7999 191 29 ► ► CD blog-dshr-org-7999 191 30     _SP blog-dshr-org-7999 191 31 2020 2020 CD blog-dshr-org-7999 191 32 ( ( -LRB- blog-dshr-org-7999 191 33 55 55 CD blog-dshr-org-7999 191 34 ) ) -RRB- blog-dshr-org-7999 191 35 ► ► NFP blog-dshr-org-7999 191 36     _SP blog-dshr-org-7999 191 37 December December NNP blog-dshr-org-7999 191 38 ( ( -LRB- blog-dshr-org-7999 191 39 4 4 CD blog-dshr-org-7999 191 40 ) ) -RRB- blog-dshr-org-7999 191 41 ► ► NFP blog-dshr-org-7999 191 42     _SP blog-dshr-org-7999 191 43 November November NNP blog-dshr-org-7999 191 44 ( ( -LRB- blog-dshr-org-7999 191 45 4 4 CD blog-dshr-org-7999 191 46 ) ) -RRB- blog-dshr-org-7999 191 47 ► ► NFP blog-dshr-org-7999 191 48     _SP blog-dshr-org-7999 191 49 October October NNP blog-dshr-org-7999 191 50 ( ( -LRB- blog-dshr-org-7999 191 51 3 3 CD blog-dshr-org-7999 191 52 ) ) -RRB- blog-dshr-org-7999 191 53 ► ► NFP blog-dshr-org-7999 191 54     _SP blog-dshr-org-7999 191 55 September September NNP blog-dshr-org-7999 191 56 ( ( -LRB- blog-dshr-org-7999 191 57 6 6 CD blog-dshr-org-7999 191 58 ) ) -RRB- blog-dshr-org-7999 191 59 ► ► NFP blog-dshr-org-7999 191 60     _SP blog-dshr-org-7999 191 61 August August NNP blog-dshr-org-7999 191 62 ( ( -LRB- blog-dshr-org-7999 191 63 5 5 CD blog-dshr-org-7999 191 64 ) ) -RRB- blog-dshr-org-7999 191 65 ► ► NFP blog-dshr-org-7999 191 66     _SP blog-dshr-org-7999 191 67 July July NNP blog-dshr-org-7999 191 68 ( ( -LRB- blog-dshr-org-7999 191 69 3 3 CD blog-dshr-org-7999 191 70 ) ) -RRB- blog-dshr-org-7999 191 71 ► ► NFP blog-dshr-org-7999 191 72     _SP blog-dshr-org-7999 191 73 June June NNP blog-dshr-org-7999 191 74 ( ( -LRB- blog-dshr-org-7999 191 75 6 6 CD blog-dshr-org-7999 191 76 ) ) -RRB- blog-dshr-org-7999 191 77 ► ► NFP blog-dshr-org-7999 191 78     _SP blog-dshr-org-7999 191 79 May May NNP blog-dshr-org-7999 191 80 ( ( -LRB- blog-dshr-org-7999 191 81 3 3 CD blog-dshr-org-7999 191 82 ) ) -RRB- blog-dshr-org-7999 191 83 ► ► NFP blog-dshr-org-7999 191 84     _SP blog-dshr-org-7999 191 85 April April NNP blog-dshr-org-7999 191 86 ( ( -LRB- blog-dshr-org-7999 191 87 5 5 CD blog-dshr-org-7999 191 88 ) ) -RRB- blog-dshr-org-7999 191 89 ► ► NFP blog-dshr-org-7999 191 90     _SP blog-dshr-org-7999 191 91 March March NNP blog-dshr-org-7999 191 92 ( ( -LRB- blog-dshr-org-7999 191 93 6 6 CD blog-dshr-org-7999 191 94 ) ) -RRB- blog-dshr-org-7999 191 95 ► ► NFP blog-dshr-org-7999 191 96     _SP blog-dshr-org-7999 191 97 February February NNP blog-dshr-org-7999 191 98 ( ( -LRB- blog-dshr-org-7999 191 99 5 5 CD blog-dshr-org-7999 191 100 ) ) -RRB- blog-dshr-org-7999 191 101 ► ► NFP blog-dshr-org-7999 191 102     _SP blog-dshr-org-7999 191 103 January January NNP blog-dshr-org-7999 191 104 ( ( -LRB- blog-dshr-org-7999 191 105 5 5 CD blog-dshr-org-7999 191 106 ) ) -RRB- blog-dshr-org-7999 191 107 ► ► CD blog-dshr-org-7999 191 108     _SP blog-dshr-org-7999 191 109 2019 2019 CD blog-dshr-org-7999 191 110 ( ( -LRB- blog-dshr-org-7999 191 111 66 66 CD blog-dshr-org-7999 191 112 ) ) -RRB- blog-dshr-org-7999 191 113 ► ► NFP blog-dshr-org-7999 191 114     _SP blog-dshr-org-7999 191 115 December December NNP blog-dshr-org-7999 191 116 ( ( -LRB- blog-dshr-org-7999 191 117 2 2 CD blog-dshr-org-7999 191 118 ) ) -RRB- blog-dshr-org-7999 191 119 ► ► NFP blog-dshr-org-7999 191 120     _SP blog-dshr-org-7999 191 121 November November NNP blog-dshr-org-7999 191 122 ( ( -LRB- blog-dshr-org-7999 191 123 4 4 CD blog-dshr-org-7999 191 124 ) ) -RRB- blog-dshr-org-7999 191 125 ► ► NFP blog-dshr-org-7999 191 126     _SP blog-dshr-org-7999 191 127 October October NNP blog-dshr-org-7999 191 128 ( ( -LRB- blog-dshr-org-7999 191 129 8) 8) CD blog-dshr-org-7999 191 130 ► ► CD blog-dshr-org-7999 191 131     _SP blog-dshr-org-7999 191 132 September September NNP blog-dshr-org-7999 191 133 ( ( -LRB- blog-dshr-org-7999 191 134 5 5 CD blog-dshr-org-7999 191 135 ) ) -RRB- blog-dshr-org-7999 191 136 ► ► NFP blog-dshr-org-7999 191 137     _SP blog-dshr-org-7999 191 138 August August NNP blog-dshr-org-7999 191 139 ( ( -LRB- blog-dshr-org-7999 191 140 5 5 CD blog-dshr-org-7999 191 141 ) ) -RRB- blog-dshr-org-7999 191 142 ► ► NFP blog-dshr-org-7999 191 143     _SP blog-dshr-org-7999 191 144 July July NNP blog-dshr-org-7999 191 145 ( ( -LRB- blog-dshr-org-7999 191 146 7 7 CD blog-dshr-org-7999 191 147 ) ) -RRB- blog-dshr-org-7999 191 148 ► ► NFP blog-dshr-org-7999 191 149     _SP blog-dshr-org-7999 191 150 June June NNP blog-dshr-org-7999 191 151 ( ( -LRB- blog-dshr-org-7999 191 152 6 6 CD blog-dshr-org-7999 191 153 ) ) -RRB- blog-dshr-org-7999 191 154 ► ► NFP blog-dshr-org-7999 191 155     _SP blog-dshr-org-7999 191 156 May May NNP blog-dshr-org-7999 191 157 ( ( -LRB- blog-dshr-org-7999 191 158 7 7 CD blog-dshr-org-7999 191 159 ) ) -RRB- blog-dshr-org-7999 191 160 ► ► NFP blog-dshr-org-7999 191 161     _SP blog-dshr-org-7999 191 162 April April NNP blog-dshr-org-7999 191 163 ( ( -LRB- blog-dshr-org-7999 191 164 6 6 CD blog-dshr-org-7999 191 165 ) ) -RRB- blog-dshr-org-7999 191 166 ► ► NFP blog-dshr-org-7999 191 167     _SP blog-dshr-org-7999 191 168 March March NNP blog-dshr-org-7999 191 169 ( ( -LRB- blog-dshr-org-7999 191 170 7 7 CD blog-dshr-org-7999 191 171 ) ) -RRB- blog-dshr-org-7999 191 172 ► ► NFP blog-dshr-org-7999 191 173     _SP blog-dshr-org-7999 191 174 February February NNP blog-dshr-org-7999 191 175 ( ( -LRB- blog-dshr-org-7999 191 176 4 4 CD blog-dshr-org-7999 191 177 ) ) -RRB- blog-dshr-org-7999 191 178 ► ► NFP blog-dshr-org-7999 191 179     _SP blog-dshr-org-7999 191 180 January January NNP blog-dshr-org-7999 191 181 ( ( -LRB- blog-dshr-org-7999 191 182 5 5 CD blog-dshr-org-7999 191 183 ) ) -RRB- blog-dshr-org-7999 191 184 ▼ ▼ CD blog-dshr-org-7999 191 185     _SP blog-dshr-org-7999 191 186 2018 2018 CD blog-dshr-org-7999 191 187 ( ( -LRB- blog-dshr-org-7999 191 188 96 96 CD blog-dshr-org-7999 191 189 ) ) -RRB- blog-dshr-org-7999 191 190 ► ► NFP blog-dshr-org-7999 191 191     _SP blog-dshr-org-7999 191 192 December December NNP blog-dshr-org-7999 191 193 ( ( -LRB- blog-dshr-org-7999 191 194 7 7 CD blog-dshr-org-7999 191 195 ) ) -RRB- blog-dshr-org-7999 191 196 ▼ ▼ CD blog-dshr-org-7999 191 197     _SP blog-dshr-org-7999 191 198 November November NNP blog-dshr-org-7999 191 199 ( ( -LRB- blog-dshr-org-7999 191 200 8) 8) CD blog-dshr-org-7999 191 201 Certificate Certificate NNP blog-dshr-org-7999 191 202 Transparency Transparency NNP blog-dshr-org-7999 191 203 Cryptocurrency Cryptocurrency NNP blog-dshr-org-7999 191 204 Collapse Collapse NNP blog-dshr-org-7999 191 205 John John NNP blog-dshr-org-7999 191 206 Wharton Wharton NNP blog-dshr-org-7999 191 207 RIP RIP NNP blog-dshr-org-7999 191 208 Cryptocurrencies Cryptocurrencies NNPS blog-dshr-org-7999 191 209 ' ' POS blog-dshr-org-7999 191 210 Seven seven CD blog-dshr-org-7999 191 211 Deadly deadly JJ blog-dshr-org-7999 191 212 Paradoxes Paradoxes NNPS blog-dshr-org-7999 191 213 Kids kid NNS blog-dshr-org-7999 191 214 Today today NN blog-dshr-org-7999 191 215 Have have VBP blog-dshr-org-7999 191 216 No no DT blog-dshr-org-7999 191 217 Idea idea NN blog-dshr-org-7999 191 218 What what WP blog-dshr-org-7999 191 219 's be VBZ blog-dshr-org-7999 191 220 Happening happen VBG blog-dshr-org-7999 191 221 To to IN blog-dshr-org-7999 191 222 Storage storage NN blog-dshr-org-7999 191 223 ? ? . blog-dshr-org-7999 192 1 Making make VBG blog-dshr-org-7999 192 2 PIEs pie NNS blog-dshr-org-7999 192 3 Is be VBZ blog-dshr-org-7999 192 4 Hard Hard NNP blog-dshr-org-7999 192 5 Ithaka Ithaka NNP blog-dshr-org-7999 192 6 's 's POS blog-dshr-org-7999 192 7 Perspective perspective NN blog-dshr-org-7999 192 8 on on IN blog-dshr-org-7999 192 9 Digital Digital NNP blog-dshr-org-7999 192 10 Preservation Preservation NNP blog-dshr-org-7999 192 11 ► ► NNP blog-dshr-org-7999 192 12     _SP blog-dshr-org-7999 192 13 October October NNP blog-dshr-org-7999 192 14 ( ( -LRB- blog-dshr-org-7999 192 15 10 10 CD blog-dshr-org-7999 192 16 ) ) -RRB- blog-dshr-org-7999 192 17 ► ► NFP blog-dshr-org-7999 192 18     _SP blog-dshr-org-7999 192 19 September September NNP blog-dshr-org-7999 192 20 ( ( -LRB- blog-dshr-org-7999 192 21 5 5 CD blog-dshr-org-7999 192 22 ) ) -RRB- blog-dshr-org-7999 192 23 ► ► NFP blog-dshr-org-7999 192 24     _SP blog-dshr-org-7999 192 25 August August NNP blog-dshr-org-7999 192 26 ( ( -LRB- blog-dshr-org-7999 192 27 8) 8) CD blog-dshr-org-7999 192 28 ► ► CD blog-dshr-org-7999 192 29     _SP blog-dshr-org-7999 192 30 July July NNP blog-dshr-org-7999 192 31 ( ( -LRB- blog-dshr-org-7999 192 32 5 5 CD blog-dshr-org-7999 192 33 ) ) -RRB- blog-dshr-org-7999 192 34 ► ► NFP blog-dshr-org-7999 192 35     _SP blog-dshr-org-7999 192 36 June June NNP blog-dshr-org-7999 192 37 ( ( -LRB- blog-dshr-org-7999 192 38 7 7 CD blog-dshr-org-7999 192 39 ) ) -RRB- blog-dshr-org-7999 192 40 ► ► NFP blog-dshr-org-7999 192 41     _SP blog-dshr-org-7999 192 42 May May NNP blog-dshr-org-7999 192 43 ( ( -LRB- blog-dshr-org-7999 192 44 10 10 CD blog-dshr-org-7999 192 45 ) ) -RRB- blog-dshr-org-7999 192 46 ► ► NFP blog-dshr-org-7999 192 47     _SP blog-dshr-org-7999 192 48 April April NNP blog-dshr-org-7999 192 49 ( ( -LRB- blog-dshr-org-7999 192 50 8) 8) CD blog-dshr-org-7999 192 51 ► ► CD blog-dshr-org-7999 192 52     _SP blog-dshr-org-7999 192 53 March March NNP blog-dshr-org-7999 192 54 ( ( -LRB- blog-dshr-org-7999 192 55 9 9 CD blog-dshr-org-7999 192 56 ) ) -RRB- blog-dshr-org-7999 192 57 ► ► NFP blog-dshr-org-7999 192 58     _SP blog-dshr-org-7999 192 59 February February NNP blog-dshr-org-7999 192 60 ( ( -LRB- blog-dshr-org-7999 192 61 9 9 CD blog-dshr-org-7999 192 62 ) ) -RRB- blog-dshr-org-7999 192 63 ► ► NFP blog-dshr-org-7999 192 64     _SP blog-dshr-org-7999 192 65 January January NNP blog-dshr-org-7999 192 66 ( ( -LRB- blog-dshr-org-7999 192 67 10 10 CD blog-dshr-org-7999 192 68 ) ) -RRB- blog-dshr-org-7999 192 69 ► ► NFP blog-dshr-org-7999 192 70     _SP blog-dshr-org-7999 192 71 2017 2017 CD blog-dshr-org-7999 192 72 ( ( -LRB- blog-dshr-org-7999 192 73 82 82 CD blog-dshr-org-7999 192 74 ) ) -RRB- blog-dshr-org-7999 192 75 ► ► NFP blog-dshr-org-7999 192 76     _SP blog-dshr-org-7999 192 77 December December NNP blog-dshr-org-7999 192 78 ( ( -LRB- blog-dshr-org-7999 192 79 6 6 CD blog-dshr-org-7999 192 80 ) ) -RRB- blog-dshr-org-7999 192 81 ► ► NFP blog-dshr-org-7999 192 82     _SP blog-dshr-org-7999 192 83 November November NNP blog-dshr-org-7999 192 84 ( ( -LRB- blog-dshr-org-7999 192 85 6 6 CD blog-dshr-org-7999 192 86 ) ) -RRB- blog-dshr-org-7999 192 87 ► ► NFP blog-dshr-org-7999 192 88     _SP blog-dshr-org-7999 192 89 October October NNP blog-dshr-org-7999 192 90 ( ( -LRB- blog-dshr-org-7999 192 91 8) 8) CD blog-dshr-org-7999 192 92 ► ► CD blog-dshr-org-7999 192 93     _SP blog-dshr-org-7999 192 94 September September NNP blog-dshr-org-7999 192 95 ( ( -LRB- blog-dshr-org-7999 192 96 6 6 CD blog-dshr-org-7999 192 97 ) ) -RRB- blog-dshr-org-7999 192 98 ► ► NFP blog-dshr-org-7999 192 99     _SP blog-dshr-org-7999 192 100 August August NNP blog-dshr-org-7999 192 101 ( ( -LRB- blog-dshr-org-7999 192 102 7 7 CD blog-dshr-org-7999 192 103 ) ) -RRB- blog-dshr-org-7999 192 104 ► ► NFP blog-dshr-org-7999 192 105     _SP blog-dshr-org-7999 192 106 July July NNP blog-dshr-org-7999 192 107 ( ( -LRB- blog-dshr-org-7999 192 108 5 5 CD blog-dshr-org-7999 192 109 ) ) -RRB- blog-dshr-org-7999 192 110 ► ► NFP blog-dshr-org-7999 192 111     _SP blog-dshr-org-7999 192 112 June June NNP blog-dshr-org-7999 192 113 ( ( -LRB- blog-dshr-org-7999 192 114 7 7 CD blog-dshr-org-7999 192 115 ) ) -RRB- blog-dshr-org-7999 192 116 ► ► NFP blog-dshr-org-7999 192 117     _SP blog-dshr-org-7999 192 118 May May NNP blog-dshr-org-7999 192 119 ( ( -LRB- blog-dshr-org-7999 192 120 6 6 CD blog-dshr-org-7999 192 121 ) ) -RRB- blog-dshr-org-7999 192 122 ► ► NFP blog-dshr-org-7999 192 123     _SP blog-dshr-org-7999 192 124 April April NNP blog-dshr-org-7999 192 125 ( ( -LRB- blog-dshr-org-7999 192 126 7 7 CD blog-dshr-org-7999 192 127 ) ) -RRB- blog-dshr-org-7999 192 128 ► ► NFP blog-dshr-org-7999 192 129     _SP blog-dshr-org-7999 192 130 March March NNP blog-dshr-org-7999 192 131 ( ( -LRB- blog-dshr-org-7999 192 132 11 11 CD blog-dshr-org-7999 192 133 ) ) -RRB- blog-dshr-org-7999 192 134 ► ► NFP blog-dshr-org-7999 192 135     _SP blog-dshr-org-7999 192 136 February February NNP blog-dshr-org-7999 192 137 ( ( -LRB- blog-dshr-org-7999 192 138 5 5 CD blog-dshr-org-7999 192 139 ) ) -RRB- blog-dshr-org-7999 192 140 ► ► NFP blog-dshr-org-7999 192 141     _SP blog-dshr-org-7999 192 142 January January NNP blog-dshr-org-7999 192 143 ( ( -LRB- blog-dshr-org-7999 192 144 8) 8) CD blog-dshr-org-7999 192 145 ► ► CD blog-dshr-org-7999 192 146     _SP blog-dshr-org-7999 192 147 2016 2016 CD blog-dshr-org-7999 192 148 ( ( -LRB- blog-dshr-org-7999 192 149 89 89 CD blog-dshr-org-7999 192 150 ) ) -RRB- blog-dshr-org-7999 192 151 ► ► NFP blog-dshr-org-7999 192 152     _SP blog-dshr-org-7999 192 153 December December NNP blog-dshr-org-7999 192 154 ( ( -LRB- blog-dshr-org-7999 192 155 4 4 CD blog-dshr-org-7999 192 156 ) ) -RRB- blog-dshr-org-7999 192 157 ► ► NFP blog-dshr-org-7999 192 158     _SP blog-dshr-org-7999 192 159 November November NNP blog-dshr-org-7999 192 160 ( ( -LRB- blog-dshr-org-7999 192 161 8) 8) CD blog-dshr-org-7999 192 162 ► ► CD blog-dshr-org-7999 192 163     _SP blog-dshr-org-7999 192 164 October October NNP blog-dshr-org-7999 192 165 ( ( -LRB- blog-dshr-org-7999 192 166 10 10 CD blog-dshr-org-7999 192 167 ) ) -RRB- blog-dshr-org-7999 192 168 ► ► NFP blog-dshr-org-7999 192 169     _SP blog-dshr-org-7999 192 170 September September NNP blog-dshr-org-7999 192 171 ( ( -LRB- blog-dshr-org-7999 192 172 8) 8) CD blog-dshr-org-7999 192 173 ► ► CD blog-dshr-org-7999 192 174     _SP blog-dshr-org-7999 192 175 August August NNP blog-dshr-org-7999 192 176 ( ( -LRB- blog-dshr-org-7999 192 177 8) 8) CD blog-dshr-org-7999 192 178 ► ► CD blog-dshr-org-7999 192 179     _SP blog-dshr-org-7999 192 180 July July NNP blog-dshr-org-7999 192 181 ( ( -LRB- blog-dshr-org-7999 192 182 7 7 CD blog-dshr-org-7999 192 183 ) ) -RRB- blog-dshr-org-7999 192 184 ► ► NFP blog-dshr-org-7999 192 185     _SP blog-dshr-org-7999 192 186 June June NNP blog-dshr-org-7999 192 187 ( ( -LRB- blog-dshr-org-7999 192 188 8) 8) CD blog-dshr-org-7999 192 189 ► ► CD blog-dshr-org-7999 192 190     _SP blog-dshr-org-7999 192 191 May May NNP blog-dshr-org-7999 192 192 ( ( -LRB- blog-dshr-org-7999 192 193 7 7 CD blog-dshr-org-7999 192 194 ) ) -RRB- blog-dshr-org-7999 192 195 ► ► NFP blog-dshr-org-7999 192 196     _SP blog-dshr-org-7999 192 197 April April NNP blog-dshr-org-7999 192 198 ( ( -LRB- blog-dshr-org-7999 192 199 5 5 CD blog-dshr-org-7999 192 200 ) ) -RRB- blog-dshr-org-7999 192 201 ► ► NFP blog-dshr-org-7999 192 202     _SP blog-dshr-org-7999 192 203 March March NNP blog-dshr-org-7999 192 204 ( ( -LRB- blog-dshr-org-7999 192 205 10 10 CD blog-dshr-org-7999 192 206 ) ) -RRB- blog-dshr-org-7999 192 207 ► ► NFP blog-dshr-org-7999 192 208     _SP blog-dshr-org-7999 192 209 February February NNP blog-dshr-org-7999 192 210 ( ( -LRB- blog-dshr-org-7999 192 211 7 7 CD blog-dshr-org-7999 192 212 ) ) -RRB- blog-dshr-org-7999 192 213 ► ► NFP blog-dshr-org-7999 192 214     _SP blog-dshr-org-7999 192 215 January January NNP blog-dshr-org-7999 192 216 ( ( -LRB- blog-dshr-org-7999 192 217 7 7 CD blog-dshr-org-7999 192 218 ) ) -RRB- blog-dshr-org-7999 192 219 ► ► NFP blog-dshr-org-7999 192 220     _SP blog-dshr-org-7999 192 221 2015 2015 CD blog-dshr-org-7999 192 222 ( ( -LRB- blog-dshr-org-7999 192 223 75 75 CD blog-dshr-org-7999 192 224 ) ) -RRB- blog-dshr-org-7999 192 225 ► ► NFP blog-dshr-org-7999 192 226     _SP blog-dshr-org-7999 192 227 December December NNP blog-dshr-org-7999 192 228 ( ( -LRB- blog-dshr-org-7999 192 229 7 7 CD blog-dshr-org-7999 192 230 ) ) -RRB- blog-dshr-org-7999 192 231 ► ► NFP blog-dshr-org-7999 192 232     _SP blog-dshr-org-7999 192 233 November November NNP blog-dshr-org-7999 192 234 ( ( -LRB- blog-dshr-org-7999 192 235 5 5 CD blog-dshr-org-7999 192 236 ) ) -RRB- blog-dshr-org-7999 192 237 ► ► NFP blog-dshr-org-7999 192 238     _SP blog-dshr-org-7999 192 239 October October NNP blog-dshr-org-7999 192 240 ( ( -LRB- blog-dshr-org-7999 192 241 11 11 CD blog-dshr-org-7999 192 242 ) ) -RRB- blog-dshr-org-7999 192 243 ► ► NFP blog-dshr-org-7999 192 244     _SP blog-dshr-org-7999 192 245 September September NNP blog-dshr-org-7999 192 246 ( ( -LRB- blog-dshr-org-7999 192 247 5 5 CD blog-dshr-org-7999 192 248 ) ) -RRB- blog-dshr-org-7999 192 249 ► ► NFP blog-dshr-org-7999 192 250     _SP blog-dshr-org-7999 192 251 August August NNP blog-dshr-org-7999 192 252 ( ( -LRB- blog-dshr-org-7999 192 253 3 3 CD blog-dshr-org-7999 192 254 ) ) -RRB- blog-dshr-org-7999 192 255 ► ► NFP blog-dshr-org-7999 192 256     _SP blog-dshr-org-7999 192 257 July July NNP blog-dshr-org-7999 192 258 ( ( -LRB- blog-dshr-org-7999 192 259 3 3 CD blog-dshr-org-7999 192 260 ) ) -RRB- blog-dshr-org-7999 192 261 ► ► NFP blog-dshr-org-7999 192 262     _SP blog-dshr-org-7999 192 263 June June NNP blog-dshr-org-7999 192 264 ( ( -LRB- blog-dshr-org-7999 192 265 8) 8) CD blog-dshr-org-7999 192 266 ► ► CD blog-dshr-org-7999 192 267     _SP blog-dshr-org-7999 192 268 May May NNP blog-dshr-org-7999 192 269 ( ( -LRB- blog-dshr-org-7999 192 270 10 10 CD blog-dshr-org-7999 192 271 ) ) -RRB- blog-dshr-org-7999 192 272 ► ► NFP blog-dshr-org-7999 192 273     _SP blog-dshr-org-7999 192 274 April April NNP blog-dshr-org-7999 192 275 ( ( -LRB- blog-dshr-org-7999 192 276 6 6 CD blog-dshr-org-7999 192 277 ) ) -RRB- blog-dshr-org-7999 192 278 ► ► NFP blog-dshr-org-7999 192 279     _SP blog-dshr-org-7999 192 280 March March NNP blog-dshr-org-7999 192 281 ( ( -LRB- blog-dshr-org-7999 192 282 6 6 CD blog-dshr-org-7999 192 283 ) ) -RRB- blog-dshr-org-7999 192 284 ► ► NFP blog-dshr-org-7999 192 285     _SP blog-dshr-org-7999 192 286 February February NNP blog-dshr-org-7999 192 287 ( ( -LRB- blog-dshr-org-7999 192 288 7 7 CD blog-dshr-org-7999 192 289 ) ) -RRB- blog-dshr-org-7999 192 290 ► ► NFP blog-dshr-org-7999 192 291     _SP blog-dshr-org-7999 192 292 January January NNP blog-dshr-org-7999 192 293 ( ( -LRB- blog-dshr-org-7999 192 294 4 4 CD blog-dshr-org-7999 192 295 ) ) -RRB- blog-dshr-org-7999 192 296 ► ► CD blog-dshr-org-7999 192 297     _SP blog-dshr-org-7999 192 298 2014 2014 CD blog-dshr-org-7999 192 299 ( ( -LRB- blog-dshr-org-7999 192 300 68 68 CD blog-dshr-org-7999 192 301 ) ) -RRB- blog-dshr-org-7999 192 302 ► ► NFP blog-dshr-org-7999 192 303     _SP blog-dshr-org-7999 192 304 December December NNP blog-dshr-org-7999 192 305 ( ( -LRB- blog-dshr-org-7999 192 306 7 7 CD blog-dshr-org-7999 192 307 ) ) -RRB- blog-dshr-org-7999 192 308 ► ► NFP blog-dshr-org-7999 192 309     _SP blog-dshr-org-7999 192 310 November November NNP blog-dshr-org-7999 192 311 ( ( -LRB- blog-dshr-org-7999 192 312 8) 8) CD blog-dshr-org-7999 192 313 ► ► CD blog-dshr-org-7999 192 314     _SP blog-dshr-org-7999 192 315 October October NNP blog-dshr-org-7999 192 316 ( ( -LRB- blog-dshr-org-7999 192 317 6 6 CD blog-dshr-org-7999 192 318 ) ) -RRB- blog-dshr-org-7999 192 319 ► ► NFP blog-dshr-org-7999 192 320     _SP blog-dshr-org-7999 192 321 September September NNP blog-dshr-org-7999 192 322 ( ( -LRB- blog-dshr-org-7999 192 323 8) 8) CD blog-dshr-org-7999 192 324 ► ► CD blog-dshr-org-7999 192 325     _SP blog-dshr-org-7999 192 326 August August NNP blog-dshr-org-7999 192 327 ( ( -LRB- blog-dshr-org-7999 192 328 7 7 CD blog-dshr-org-7999 192 329 ) ) -RRB- blog-dshr-org-7999 192 330 ► ► NFP blog-dshr-org-7999 192 331     _SP blog-dshr-org-7999 192 332 July July NNP blog-dshr-org-7999 192 333 ( ( -LRB- blog-dshr-org-7999 192 334 3 3 CD blog-dshr-org-7999 192 335 ) ) -RRB- blog-dshr-org-7999 192 336 ► ► NFP blog-dshr-org-7999 192 337     _SP blog-dshr-org-7999 192 338 June June NNP blog-dshr-org-7999 192 339 ( ( -LRB- blog-dshr-org-7999 192 340 5 5 CD blog-dshr-org-7999 192 341 ) ) -RRB- blog-dshr-org-7999 192 342 ► ► NFP blog-dshr-org-7999 192 343     _SP blog-dshr-org-7999 192 344 May May NNP blog-dshr-org-7999 192 345 ( ( -LRB- blog-dshr-org-7999 192 346 6 6 CD blog-dshr-org-7999 192 347 ) ) -RRB- blog-dshr-org-7999 192 348 ► ► NFP blog-dshr-org-7999 192 349     _SP blog-dshr-org-7999 192 350 April April NNP blog-dshr-org-7999 192 351 ( ( -LRB- blog-dshr-org-7999 192 352 5 5 CD blog-dshr-org-7999 192 353 ) ) -RRB- blog-dshr-org-7999 192 354 ► ► NFP blog-dshr-org-7999 192 355     _SP blog-dshr-org-7999 192 356 March March NNP blog-dshr-org-7999 192 357 ( ( -LRB- blog-dshr-org-7999 192 358 6 6 CD blog-dshr-org-7999 192 359 ) ) -RRB- blog-dshr-org-7999 192 360 ► ► NFP blog-dshr-org-7999 192 361     _SP blog-dshr-org-7999 192 362 February February NNP blog-dshr-org-7999 192 363 ( ( -LRB- blog-dshr-org-7999 192 364 2 2 CD blog-dshr-org-7999 192 365 ) ) -RRB- blog-dshr-org-7999 192 366 ► ► NFP blog-dshr-org-7999 192 367     _SP blog-dshr-org-7999 192 368 January January NNP blog-dshr-org-7999 192 369 ( ( -LRB- blog-dshr-org-7999 192 370 5 5 CD blog-dshr-org-7999 192 371 ) ) -RRB- blog-dshr-org-7999 192 372 ► ► CD blog-dshr-org-7999 192 373     _SP blog-dshr-org-7999 192 374 2013 2013 CD blog-dshr-org-7999 192 375 ( ( -LRB- blog-dshr-org-7999 192 376 67 67 CD blog-dshr-org-7999 192 377 ) ) -RRB- blog-dshr-org-7999 192 378 ► ► NFP blog-dshr-org-7999 192 379     _SP blog-dshr-org-7999 192 380 December December NNP blog-dshr-org-7999 192 381 ( ( -LRB- blog-dshr-org-7999 192 382 3 3 CD blog-dshr-org-7999 192 383 ) ) -RRB- blog-dshr-org-7999 192 384 ► ► NFP blog-dshr-org-7999 192 385     _SP blog-dshr-org-7999 192 386 November November NNP blog-dshr-org-7999 192 387 ( ( -LRB- blog-dshr-org-7999 192 388 6 6 CD blog-dshr-org-7999 192 389 ) ) -RRB- blog-dshr-org-7999 192 390 ► ► NFP blog-dshr-org-7999 192 391     _SP blog-dshr-org-7999 192 392 October October NNP blog-dshr-org-7999 192 393 ( ( -LRB- blog-dshr-org-7999 192 394 7 7 CD blog-dshr-org-7999 192 395 ) ) -RRB- blog-dshr-org-7999 192 396 ► ► NFP blog-dshr-org-7999 192 397     _SP blog-dshr-org-7999 192 398 September September NNP blog-dshr-org-7999 192 399 ( ( -LRB- blog-dshr-org-7999 192 400 6 6 CD blog-dshr-org-7999 192 401 ) ) -RRB- blog-dshr-org-7999 192 402 ► ► NFP blog-dshr-org-7999 192 403     _SP blog-dshr-org-7999 192 404 August August NNP blog-dshr-org-7999 192 405 ( ( -LRB- blog-dshr-org-7999 192 406 3 3 CD blog-dshr-org-7999 192 407 ) ) -RRB- blog-dshr-org-7999 192 408 ► ► NFP blog-dshr-org-7999 192 409     _SP blog-dshr-org-7999 192 410 July July NNP blog-dshr-org-7999 192 411 ( ( -LRB- blog-dshr-org-7999 192 412 5 5 CD blog-dshr-org-7999 192 413 ) ) -RRB- blog-dshr-org-7999 192 414 ► ► NFP blog-dshr-org-7999 192 415     _SP blog-dshr-org-7999 192 416 June June NNP blog-dshr-org-7999 192 417 ( ( -LRB- blog-dshr-org-7999 192 418 6 6 CD blog-dshr-org-7999 192 419 ) ) -RRB- blog-dshr-org-7999 192 420 ► ► NFP blog-dshr-org-7999 192 421     _SP blog-dshr-org-7999 192 422 May May NNP blog-dshr-org-7999 192 423 ( ( -LRB- blog-dshr-org-7999 192 424 5 5 CD blog-dshr-org-7999 192 425 ) ) -RRB- blog-dshr-org-7999 192 426 ► ► NFP blog-dshr-org-7999 192 427     _SP blog-dshr-org-7999 192 428 April April NNP blog-dshr-org-7999 192 429 ( ( -LRB- blog-dshr-org-7999 192 430 9 9 CD blog-dshr-org-7999 192 431 ) ) -RRB- blog-dshr-org-7999 192 432 ► ► NFP blog-dshr-org-7999 192 433     _SP blog-dshr-org-7999 192 434 March March NNP blog-dshr-org-7999 192 435 ( ( -LRB- blog-dshr-org-7999 192 436 5 5 CD blog-dshr-org-7999 192 437 ) ) -RRB- blog-dshr-org-7999 192 438 ► ► NFP blog-dshr-org-7999 192 439     _SP blog-dshr-org-7999 192 440 February February NNP blog-dshr-org-7999 192 441 ( ( -LRB- blog-dshr-org-7999 192 442 5 5 CD blog-dshr-org-7999 192 443 ) ) -RRB- blog-dshr-org-7999 192 444 ► ► NFP blog-dshr-org-7999 192 445     _SP blog-dshr-org-7999 192 446 January January NNP blog-dshr-org-7999 192 447 ( ( -LRB- blog-dshr-org-7999 192 448 7 7 CD blog-dshr-org-7999 192 449 ) ) -RRB- blog-dshr-org-7999 192 450 ► ► CD blog-dshr-org-7999 192 451     _SP blog-dshr-org-7999 192 452 2012 2012 CD blog-dshr-org-7999 192 453 ( ( -LRB- blog-dshr-org-7999 192 454 43 43 CD blog-dshr-org-7999 192 455 ) ) -RRB- blog-dshr-org-7999 192 456 ► ► NFP blog-dshr-org-7999 192 457     _SP blog-dshr-org-7999 192 458 December December NNP blog-dshr-org-7999 192 459 ( ( -LRB- blog-dshr-org-7999 192 460 4 4 CD blog-dshr-org-7999 192 461 ) ) -RRB- blog-dshr-org-7999 192 462 ► ► NFP blog-dshr-org-7999 192 463     _SP blog-dshr-org-7999 192 464 November November NNP blog-dshr-org-7999 192 465 ( ( -LRB- blog-dshr-org-7999 192 466 4 4 CD blog-dshr-org-7999 192 467 ) ) -RRB- blog-dshr-org-7999 192 468 ► ► NFP blog-dshr-org-7999 192 469     _SP blog-dshr-org-7999 192 470 October October NNP blog-dshr-org-7999 192 471 ( ( -LRB- blog-dshr-org-7999 192 472 6 6 CD blog-dshr-org-7999 192 473 ) ) -RRB- blog-dshr-org-7999 192 474 ► ► NFP blog-dshr-org-7999 192 475     _SP blog-dshr-org-7999 192 476 September September NNP blog-dshr-org-7999 192 477 ( ( -LRB- blog-dshr-org-7999 192 478 6 6 CD blog-dshr-org-7999 192 479 ) ) -RRB- blog-dshr-org-7999 192 480 ► ► NFP blog-dshr-org-7999 192 481     _SP blog-dshr-org-7999 192 482 August August NNP blog-dshr-org-7999 192 483 ( ( -LRB- blog-dshr-org-7999 192 484 2 2 CD blog-dshr-org-7999 192 485 ) ) -RRB- blog-dshr-org-7999 192 486 ► ► NFP blog-dshr-org-7999 192 487     _SP blog-dshr-org-7999 192 488 July July NNP blog-dshr-org-7999 192 489 ( ( -LRB- blog-dshr-org-7999 192 490 5 5 CD blog-dshr-org-7999 192 491 ) ) -RRB- blog-dshr-org-7999 192 492 ► ► NFP blog-dshr-org-7999 192 493     _SP blog-dshr-org-7999 192 494 June June NNP blog-dshr-org-7999 192 495 ( ( -LRB- blog-dshr-org-7999 192 496 2 2 CD blog-dshr-org-7999 192 497 ) ) -RRB- blog-dshr-org-7999 192 498 ► ► NFP blog-dshr-org-7999 192 499     _SP blog-dshr-org-7999 192 500 May May NNP blog-dshr-org-7999 192 501 ( ( -LRB- blog-dshr-org-7999 192 502 5 5 CD blog-dshr-org-7999 192 503 ) ) -RRB- blog-dshr-org-7999 192 504 ► ► NFP blog-dshr-org-7999 192 505     _SP blog-dshr-org-7999 192 506 March March NNP blog-dshr-org-7999 192 507 ( ( -LRB- blog-dshr-org-7999 192 508 1 1 CD blog-dshr-org-7999 192 509 ) ) -RRB- blog-dshr-org-7999 192 510 ► ► NFP blog-dshr-org-7999 192 511     _SP blog-dshr-org-7999 192 512 February February NNP blog-dshr-org-7999 192 513 ( ( -LRB- blog-dshr-org-7999 192 514 5 5 CD blog-dshr-org-7999 192 515 ) ) -RRB- blog-dshr-org-7999 192 516 ► ► NFP blog-dshr-org-7999 192 517     _SP blog-dshr-org-7999 192 518 January January NNP blog-dshr-org-7999 192 519 ( ( -LRB- blog-dshr-org-7999 192 520 3 3 CD blog-dshr-org-7999 192 521 ) ) -RRB- blog-dshr-org-7999 192 522 ► ► CD blog-dshr-org-7999 192 523     _SP blog-dshr-org-7999 192 524 2011 2011 CD blog-dshr-org-7999 192 525 ( ( -LRB- blog-dshr-org-7999 192 526 40 40 CD blog-dshr-org-7999 192 527 ) ) -RRB- blog-dshr-org-7999 192 528 ► ► NFP blog-dshr-org-7999 192 529     _SP blog-dshr-org-7999 192 530 December December NNP blog-dshr-org-7999 192 531 ( ( -LRB- blog-dshr-org-7999 192 532 2 2 CD blog-dshr-org-7999 192 533 ) ) -RRB- blog-dshr-org-7999 192 534 ► ► NFP blog-dshr-org-7999 192 535     _SP blog-dshr-org-7999 192 536 November November NNP blog-dshr-org-7999 192 537 ( ( -LRB- blog-dshr-org-7999 192 538 1 1 CD blog-dshr-org-7999 192 539 ) ) -RRB- blog-dshr-org-7999 192 540 ► ► NFP blog-dshr-org-7999 192 541     _SP blog-dshr-org-7999 192 542 October October NNP blog-dshr-org-7999 192 543 ( ( -LRB- blog-dshr-org-7999 192 544 7 7 CD blog-dshr-org-7999 192 545 ) ) -RRB- blog-dshr-org-7999 192 546 ► ► NFP blog-dshr-org-7999 192 547     _SP blog-dshr-org-7999 192 548 September September NNP blog-dshr-org-7999 192 549 ( ( -LRB- blog-dshr-org-7999 192 550 3 3 CD blog-dshr-org-7999 192 551 ) ) -RRB- blog-dshr-org-7999 192 552 ► ► NFP blog-dshr-org-7999 192 553     _SP blog-dshr-org-7999 192 554 August August NNP blog-dshr-org-7999 192 555 ( ( -LRB- blog-dshr-org-7999 192 556 5 5 CD blog-dshr-org-7999 192 557 ) ) -RRB- blog-dshr-org-7999 192 558 ► ► NFP blog-dshr-org-7999 192 559     _SP blog-dshr-org-7999 192 560 July July NNP blog-dshr-org-7999 192 561 ( ( -LRB- blog-dshr-org-7999 192 562 2 2 CD blog-dshr-org-7999 192 563 ) ) -RRB- blog-dshr-org-7999 192 564 ► ► NFP blog-dshr-org-7999 192 565     _SP blog-dshr-org-7999 192 566 June June NNP blog-dshr-org-7999 192 567 ( ( -LRB- blog-dshr-org-7999 192 568 2 2 CD blog-dshr-org-7999 192 569 ) ) -RRB- blog-dshr-org-7999 192 570 ► ► NFP blog-dshr-org-7999 192 571     _SP blog-dshr-org-7999 192 572 May May NNP blog-dshr-org-7999 192 573 ( ( -LRB- blog-dshr-org-7999 192 574 2 2 CD blog-dshr-org-7999 192 575 ) ) -RRB- blog-dshr-org-7999 192 576 ► ► NFP blog-dshr-org-7999 192 577     _SP blog-dshr-org-7999 192 578 April April NNP blog-dshr-org-7999 192 579 ( ( -LRB- blog-dshr-org-7999 192 580 4 4 CD blog-dshr-org-7999 192 581 ) ) -RRB- blog-dshr-org-7999 192 582 ► ► NFP blog-dshr-org-7999 192 583     _SP blog-dshr-org-7999 192 584 March March NNP blog-dshr-org-7999 192 585 ( ( -LRB- blog-dshr-org-7999 192 586 4 4 CD blog-dshr-org-7999 192 587 ) ) -RRB- blog-dshr-org-7999 192 588 ► ► NFP blog-dshr-org-7999 192 589     _SP blog-dshr-org-7999 192 590 February February NNP blog-dshr-org-7999 192 591 ( ( -LRB- blog-dshr-org-7999 192 592 4 4 CD blog-dshr-org-7999 192 593 ) ) -RRB- blog-dshr-org-7999 192 594 ► ► NFP blog-dshr-org-7999 192 595     _SP blog-dshr-org-7999 192 596 January January NNP blog-dshr-org-7999 192 597 ( ( -LRB- blog-dshr-org-7999 192 598 4 4 CD blog-dshr-org-7999 192 599 ) ) -RRB- blog-dshr-org-7999 192 600 ► ► CD blog-dshr-org-7999 192 601     _SP blog-dshr-org-7999 192 602 2010 2010 CD blog-dshr-org-7999 192 603 ( ( -LRB- blog-dshr-org-7999 192 604 17 17 CD blog-dshr-org-7999 192 605 ) ) -RRB- blog-dshr-org-7999 192 606 ► ► NFP blog-dshr-org-7999 192 607     _SP blog-dshr-org-7999 192 608 December December NNP blog-dshr-org-7999 192 609 ( ( -LRB- blog-dshr-org-7999 192 610 5 5 CD blog-dshr-org-7999 192 611 ) ) -RRB- blog-dshr-org-7999 192 612 ► ► NFP blog-dshr-org-7999 192 613     _SP blog-dshr-org-7999 192 614 November November NNP blog-dshr-org-7999 192 615 ( ( -LRB- blog-dshr-org-7999 192 616 3 3 CD blog-dshr-org-7999 192 617 ) ) -RRB- blog-dshr-org-7999 192 618 ► ► NFP blog-dshr-org-7999 192 619     _SP blog-dshr-org-7999 192 620 October October NNP blog-dshr-org-7999 192 621 ( ( -LRB- blog-dshr-org-7999 192 622 4 4 CD blog-dshr-org-7999 192 623 ) ) -RRB- blog-dshr-org-7999 192 624 ► ► NFP blog-dshr-org-7999 192 625     _SP blog-dshr-org-7999 192 626 September September NNP blog-dshr-org-7999 192 627 ( ( -LRB- blog-dshr-org-7999 192 628 2 2 CD blog-dshr-org-7999 192 629 ) ) -RRB- blog-dshr-org-7999 192 630 ► ► NFP blog-dshr-org-7999 192 631     _SP blog-dshr-org-7999 192 632 July July NNP blog-dshr-org-7999 192 633 ( ( -LRB- blog-dshr-org-7999 192 634 1 1 CD blog-dshr-org-7999 192 635 ) ) -RRB- blog-dshr-org-7999 192 636 ► ► NFP blog-dshr-org-7999 192 637     _SP blog-dshr-org-7999 192 638 June June NNP blog-dshr-org-7999 192 639 ( ( -LRB- blog-dshr-org-7999 192 640 1 1 CD blog-dshr-org-7999 192 641 ) ) -RRB- blog-dshr-org-7999 192 642 ► ► NFP blog-dshr-org-7999 192 643     _SP blog-dshr-org-7999 192 644 February February NNP blog-dshr-org-7999 192 645 ( ( -LRB- blog-dshr-org-7999 192 646 1 1 CD blog-dshr-org-7999 192 647 ) ) -RRB- blog-dshr-org-7999 192 648 ► ► NFP blog-dshr-org-7999 192 649     _SP blog-dshr-org-7999 192 650 2009 2009 CD blog-dshr-org-7999 192 651 ( ( -LRB- blog-dshr-org-7999 192 652 8) 8) CD blog-dshr-org-7999 192 653 ► ► CD blog-dshr-org-7999 192 654     _SP blog-dshr-org-7999 192 655 July July NNP blog-dshr-org-7999 192 656 ( ( -LRB- blog-dshr-org-7999 192 657 1 1 CD blog-dshr-org-7999 192 658 ) ) -RRB- blog-dshr-org-7999 192 659 ► ► NFP blog-dshr-org-7999 192 660     _SP blog-dshr-org-7999 192 661 June June NNP blog-dshr-org-7999 192 662 ( ( -LRB- blog-dshr-org-7999 192 663 1 1 CD blog-dshr-org-7999 192 664 ) ) -RRB- blog-dshr-org-7999 192 665 ► ► NFP blog-dshr-org-7999 192 666     _SP blog-dshr-org-7999 192 667 May May NNP blog-dshr-org-7999 192 668 ( ( -LRB- blog-dshr-org-7999 192 669 1 1 CD blog-dshr-org-7999 192 670 ) ) -RRB- blog-dshr-org-7999 192 671 ► ► NFP blog-dshr-org-7999 192 672     _SP blog-dshr-org-7999 192 673 April April NNP blog-dshr-org-7999 192 674 ( ( -LRB- blog-dshr-org-7999 192 675 1 1 CD blog-dshr-org-7999 192 676 ) ) -RRB- blog-dshr-org-7999 192 677 ► ► NFP blog-dshr-org-7999 192 678     _SP blog-dshr-org-7999 192 679 March March NNP blog-dshr-org-7999 192 680 ( ( -LRB- blog-dshr-org-7999 192 681 2 2 CD blog-dshr-org-7999 192 682 ) ) -RRB- blog-dshr-org-7999 192 683 ► ► NFP blog-dshr-org-7999 192 684     _SP blog-dshr-org-7999 192 685 January January NNP blog-dshr-org-7999 192 686 ( ( -LRB- blog-dshr-org-7999 192 687 2 2 CD blog-dshr-org-7999 192 688 ) ) -RRB- blog-dshr-org-7999 192 689 ► ► NFP blog-dshr-org-7999 192 690     _SP blog-dshr-org-7999 192 691 2008 2008 CD blog-dshr-org-7999 192 692 ( ( -LRB- blog-dshr-org-7999 192 693 8) 8) CD blog-dshr-org-7999 192 694 ► ► CD blog-dshr-org-7999 192 695     _SP blog-dshr-org-7999 192 696 December December NNP blog-dshr-org-7999 192 697 ( ( -LRB- blog-dshr-org-7999 192 698 2 2 CD blog-dshr-org-7999 192 699 ) ) -RRB- blog-dshr-org-7999 192 700 ► ► NFP blog-dshr-org-7999 192 701     _SP blog-dshr-org-7999 192 702 March March NNP blog-dshr-org-7999 192 703 ( ( -LRB- blog-dshr-org-7999 192 704 1 1 CD blog-dshr-org-7999 192 705 ) ) -RRB- blog-dshr-org-7999 192 706 ► ► NFP blog-dshr-org-7999 192 707     _SP blog-dshr-org-7999 192 708 January January NNP blog-dshr-org-7999 192 709 ( ( -LRB- blog-dshr-org-7999 192 710 5 5 CD blog-dshr-org-7999 192 711 ) ) -RRB- blog-dshr-org-7999 192 712 ► ► CD blog-dshr-org-7999 192 713     _SP blog-dshr-org-7999 192 714 2007 2007 CD blog-dshr-org-7999 192 715 ( ( -LRB- blog-dshr-org-7999 192 716 14 14 CD blog-dshr-org-7999 192 717 ) ) -RRB- blog-dshr-org-7999 192 718 ► ► NFP blog-dshr-org-7999 192 719     _SP blog-dshr-org-7999 192 720 December December NNP blog-dshr-org-7999 192 721 ( ( -LRB- blog-dshr-org-7999 192 722 1 1 CD blog-dshr-org-7999 192 723 ) ) -RRB- blog-dshr-org-7999 192 724 ► ► NFP blog-dshr-org-7999 192 725     _SP blog-dshr-org-7999 192 726 October October NNP blog-dshr-org-7999 192 727 ( ( -LRB- blog-dshr-org-7999 192 728 3 3 CD blog-dshr-org-7999 192 729 ) ) -RRB- blog-dshr-org-7999 192 730 ► ► NFP blog-dshr-org-7999 192 731     _SP blog-dshr-org-7999 192 732 September September NNP blog-dshr-org-7999 192 733 ( ( -LRB- blog-dshr-org-7999 192 734 1 1 CD blog-dshr-org-7999 192 735 ) ) -RRB- blog-dshr-org-7999 192 736 ► ► NFP blog-dshr-org-7999 192 737     _SP blog-dshr-org-7999 192 738 August August NNP blog-dshr-org-7999 192 739 ( ( -LRB- blog-dshr-org-7999 192 740 1 1 CD blog-dshr-org-7999 192 741 ) ) -RRB- blog-dshr-org-7999 192 742 ► ► NFP blog-dshr-org-7999 192 743     _SP blog-dshr-org-7999 192 744 July July NNP blog-dshr-org-7999 192 745 ( ( -LRB- blog-dshr-org-7999 192 746 2 2 CD blog-dshr-org-7999 192 747 ) ) -RRB- blog-dshr-org-7999 192 748 ► ► NFP blog-dshr-org-7999 192 749     _SP blog-dshr-org-7999 192 750 June June NNP blog-dshr-org-7999 192 751 ( ( -LRB- blog-dshr-org-7999 192 752 3 3 CD blog-dshr-org-7999 192 753 ) ) -RRB- blog-dshr-org-7999 192 754 ► ► NFP blog-dshr-org-7999 192 755     _SP blog-dshr-org-7999 192 756 May May NNP blog-dshr-org-7999 192 757 ( ( -LRB- blog-dshr-org-7999 192 758 1 1 CD blog-dshr-org-7999 192 759 ) ) -RRB- blog-dshr-org-7999 192 760 ► ► NFP blog-dshr-org-7999 192 761     _SP blog-dshr-org-7999 192 762 April April NNP blog-dshr-org-7999 192 763 ( ( -LRB- blog-dshr-org-7999 192 764 2 2 LS blog-dshr-org-7999 192 765 ) ) -RRB- blog-dshr-org-7999 192 766 LOCKSS LOCKSS NNP blog-dshr-org-7999 192 767 system system NN blog-dshr-org-7999 192 768 has have VBZ blog-dshr-org-7999 192 769 permission permission NN blog-dshr-org-7999 192 770 to to TO blog-dshr-org-7999 192 771 collect collect VB blog-dshr-org-7999 192 772 , , , blog-dshr-org-7999 192 773 preserve preserve VB blog-dshr-org-7999 192 774 , , , blog-dshr-org-7999 192 775 and and CC blog-dshr-org-7999 192 776 serve serve VB blog-dshr-org-7999 192 777 this this DT blog-dshr-org-7999 192 778 Archival Archival NNP blog-dshr-org-7999 192 779 Unit Unit NNP blog-dshr-org-7999 192 780 . . . blog-dshr-org-7999 193 1 Simple simple JJ blog-dshr-org-7999 193 2 theme theme NN blog-dshr-org-7999 193 3 . . . blog-dshr-org-7999 194 1 Powered power VBN blog-dshr-org-7999 194 2 by by IN blog-dshr-org-7999 194 3 Blogger Blogger NNP blog-dshr-org-7999 194 4 . . .