ONLINE ENCRYPTION: ROOTS ARE SHOWING
Jersey City, NJ, December 15, 2009 – In X.509 encryption, discriminating buyers check to be sure that certificate roots are well-protected. Certificate owners also check the distribution of the roots: can they be found in as many of the major browsers as possible? Owners aim for widespread distribution across all browsers. Public Key Infrastructure (PKI) certificates allow …