Ivan Shmakov
2016-11-27 07:07:49 UTC
[Cross-posting to news:comp.infosystems.www.misc.]
scarecrow. The digital certificate prodivers are the ones that
benefit the most.
Well, we have all sorts of community-driven things now; like,
say, a free encyclopedia. This even spans to the areas where
security is of great importance -- like for an operating system.
It's no surprise that efforts began to create a community-driven
CA, too. Sadly, after over a decade, they still are having
way too little luck with general recognition.
I choose to rely on their X.509 certificates nevertheless.
If anything, after the Heartbleed controversy, theirs look more
trustworthy than StartCom's.
or just one's employer or school "getting curious") is generally
distinguished from MitM -- but is no less an important attack
that can be mitigated with encryption in general, including TLS.
I'm encountering more and more sites that use https for pages where
no particular need for security is evident. This seems to be a very
recent thing (within the past few months). It is a considerable
nuisance as my browser refuses to open pages if it can't establish a
secure connection. Any suggestions as to why authors do this?
Probably due to pressure from digital certificate propagandano particular need for security is evident. This seems to be a very
recent thing (within the past few months). It is a considerable
nuisance as my browser refuses to open pages if it can't establish a
secure connection. Any suggestions as to why authors do this?
scarecrow. The digital certificate prodivers are the ones that
benefit the most.
say, a free encyclopedia. This even spans to the areas where
security is of great importance -- like for an operating system.
It's no surprise that efforts began to create a community-driven
CA, too. Sadly, after over a decade, they still are having
way too little luck with general recognition.
I choose to rely on their X.509 certificates nevertheless.
If anything, after the Heartbleed controversy, theirs look more
trustworthy than StartCom's.
HTTPS is only effective against man-in-the-middle attack. Any hacker
who want to brute force a site login or do SQL injection exploit
don't need to bother with the HTTPS encryption because anyone can
access the site at protocol level.
The "passive eavesdropper" case (as in: government surveillance;who want to brute force a site login or do SQL injection exploit
don't need to bother with the HTTPS encryption because anyone can
access the site at protocol level.
or just one's employer or school "getting curious") is generally
distinguished from MitM -- but is no less an important attack
that can be mitigated with encryption in general, including TLS.
--
FSF associate member #7257 58F8 0F47 53F5 2EB2 F6A5 8916 3013 B6A0 230E 334A
FSF associate member #7257 58F8 0F47 53F5 2EB2 F6A5 8916 3013 B6A0 230E 334A