On 27/10/17 2:02 am, David Cake wrote:
I revised the document significantly from Alex’s version, but the majority of the changes are simply to remove operational and template material (such as descriptions of timelines, etc.)
I have made some changes to the group conclusions in the document, but I hope that I have not included anything not specifically on the call.
Please let me know if you think any changes need to be made very quickly - other wise this draft will be sent to the working group in a few hours,
Sorry for being late to reply, I was travelling yesterday and am only seeing this now while I'm here in the working group room. I've consulted with my colleagues who work on Let's Encrypt. There are several ways that validation can be performed but none of them require access to WHOIS/RDS data. The document already assumes that this is the case but for what it's worth, I can confirm it "officially". -- Jeremy Malcolm Senior Global Policy Analyst Electronic Frontier Foundation https://eff.org jmalcolm@eff.org Tel: 415.436.9333 ext 161 :: Defending Your Rights in the Digital World :: Public key: https://www.eff.org/files/2016/11/27/key_jmalcolm.txt PGP fingerprint: 75D2 4C0D 35EA EA2F 8CA8 8F79 4911 EC4A EDDF 1122