1. Suppose a CA is malicious. What bad things could the CA accomplish?
2. Assume a universal PM. Can any security problems arise because of the use of this single PM across multiple applications?
3. What policy or organizational challenges might impede or prevent the deployment of a worldwide universal PM?
4. In addition to the examples in Sections 18.2.2-182.5, give three example scenarios for which a PKI might be viable.