logoalt Hacker News

dborehamtoday at 1:16 AM0 repliesview on HN

I think the idea is the attacker didn't compromise both the local machine and the remote log sink machine. If you want to get really fancy the techniques used in cert revocation logs/blockchains could be used.