| ▲ | bob1029 3 days ago | |||||||
Correct. The keys are only used for signing JWTs. Trust was established with the vendor out of band from this wire protocol (the URL they scan for public keys). | ||||||||
| ▲ | SahAssar 2 days ago | parent [-] | |||||||
I'm not sure I understand, but haven't you just moved the problem to the out of band layer? And is that layer not secured using the same normal (somewhat) long-lived TLS as most sites? I don't think I understand the threat model you are using here? | ||||||||
| ||||||||