You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, I believe that when the inclusion proof is verified, the checkpoint is not. Verifying the checkpoint is important since it ties the inclusion proof to the log, since the checkpoint is signed by the log. Without the checkpoint, you're verifying against an untrusted root hash with no link back to the log.
The Rekor public key, the same key used for verifying the SET, should be used to verify the checkpoint.
The text was updated successfully, but these errors were encountered:
Description
Currently, I believe that when the inclusion proof is verified, the checkpoint is not. Verifying the checkpoint is important since it ties the inclusion proof to the log, since the checkpoint is signed by the log. Without the checkpoint, you're verifying against an untrusted root hash with no link back to the log.
The Rekor public key, the same key used for verifying the SET, should be used to verify the checkpoint.
The text was updated successfully, but these errors were encountered: