| http://www.w3.org/ns/prov#value | - That would enable your application (SSH) to have a secure connection that can even withstand a MITM attack as long as you can verify the DNS signing keys, irregardless of whether or not you have ever connected to that server before.The same sort of system can be used for email sign Re:
|