Is hierarchical public-key certification the next target for hackers?