This study proposes an evolution from pinning-in-the-host to pinning-in-the-net, by enabling
mechanisms to validate certificates as they travel through a given network. Certificates would
be classifi ed as trusted or not trusted as a result of cross-information obtained from different
sources. This would result in early detection of suspicious certifi cates and would trigger
mechanisms to defeat the attack; minimize its impact; and gather information on the attackers.
Additionally, a more detailed and thorough analysis could be performed.