Uncovered Weaknesses in the System Inline key distribution Key compromise risk Few signatures Trust of the signatures and keys