1. Create a self-signed certificate using the cryptography packages or libraries on your machine.
2. Find a new product or system that uses a PKl. This might be the &uric product or system that you analyzed for Exercise 1.8.
Conduct a security review of that product or system as described in Section 1.12, this time focusing on the security and privacy issues surrounding the use of the PKI.
Exercise 1.8
Find a new product or system that was announced or released within the last three months. Conduct a security review of that product or system as described in Section 1.12. Pick one of the assets that you identified and construct an attack tree for compromising that asset.