This section discusses some aspects of offline delegation in distributed systems, and in our system in particular. First we argue why offline delegation does not weaken the security of the system, then we discuss issues related to the trusted computing base, revocation of certificates and performance of the prototype implementation.