nNeeds out of band communication
with the parent and to pre-configured
resolvers
nThe parent needs to establish your
identity out of band again
nYour children need
protection. How to protect them
best? Leaving
them unsecured?
nThere will be a period that the
stolen key can be used to generate
data useful on the Internet
nThere is no Ôrevoke keyÕ
mechanism
nEmergency procedure must be on the
shelf