<div dir="ltr"><div>Hi all,<br><br></div>I am Shashank, a sophomore at National Institute
of Technology, Karnataka from India. I recently began exploring NDN and
have been fascinated by its data security aspect. However, since I am
new to the field, I have quite a few doubts regarding the same, and I
was hoping for your patience and guidance to clarify them.<br><br><div>1)
I was trying to understand how cryptographically signing packets works,
and have got a certain grasp of it's advantages, however, I had a doubt
- If the public keys themselves are named, then with the right naming
convention, couldn't an attacker get access to data that he is not
supposed to view. How is this prevented?<br><br></div><div>2) Is there
any mechanism to detect if the producer of data has been compromised,
i.e, his private key has been obtained by a third party? If so, since
the certificates are cached, how do we detect if the producer is safe or
not?<br><br></div><div>I look forward to learning a lot here and eagerly await your response. Thank you.<br></div><div><br></div><div>Yours sincerely,</div></div>