Uncovered Weaknesses in the System Inline key distribution Key compromise risk Few signatures Trust of the signatures and keys Persistence of expired keys