From 873c620241652c17438e7b1a6b935f2a03ce3a52 Mon Sep 17 00:00:00 2001 From: Heiko Schaefer Date: Fri, 1 Dec 2023 15:22:54 +0100 Subject: [PATCH] clarification from andrew --- book/source/04-certificates.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/book/source/04-certificates.md b/book/source/04-certificates.md index cea5383..ac5c396 100644 --- a/book/source/04-certificates.md +++ b/book/source/04-certificates.md @@ -606,4 +606,4 @@ Without any restrictions in place, malicious entities can flood a certificate wi It also opens the door to potential denial-of-service attacks, rendering the certificate non-functional or significantly impeding its operation. -The popular [SKS keyserver network experienced certificate flooding firsthand](https://dkg.fifthhorseman.net/blog/openpgp-certificate-flooding.html), causing it to shut down operations in 2019. +The popular [SKS keyserver network experienced certificate flooding firsthand](https://dkg.fifthhorseman.net/blog/openpgp-certificate-flooding.html) in 2019, causing significant changes to its operation.