Talk:Chain of trust

I rewrote this article to make it sound more like an encyclopedia article than a college lecture, but I left the stub tag on it since it still needs some attention from somebody who is more knowelegable about trusted computing than I am. --Transfinite 05:00, 10 June 2006 (UTC)

As it applies to DNSSEC
DNSSEC also uses a chain of trust, but I don't believe it has anything to do with trusted computing or hardware. Perhaps this article should be re-written to reflect the more general concept of a chain of trust.--74.100.232.184 (talk) 13:37, 4 November 2010 (UTC)