… Kristan This paper looks at how developers can use open and freely available technology to provide a level of identity security and trust to service discovery in an untrusted ad-hoc … supported in both BIND (8) and Windows Server 2008 R2 (6). Not all top-level domains (such as .com and .net) are currently signed. Furthermore, the root zone is not signed. (9) Without these … to discover the entire structure of the DNS domain, which can expose hidden records (such as contact information, public keys, and directory information). The counter argument, however, is …