Convergence, (in-browser) certificate pinning, and a few more. You could also use DNSSEC to serve the certificate.
2013/6/30 James A. Donald <jam...@echeque.com> > The biggest Tor vulnerability is that governments and large criminal > organizations (but I repeat myself) can use their influence over a CA to > perform a man in the middle attack. > > I don't think they are doing this (as I said, they only bother with the > low hanging fruit) but they could. > > Is there a tool that detects changes of CA? > > ______________________________**_________________ > cryptography mailing list > cryptography@randombit.net > http://lists.randombit.net/**mailman/listinfo/cryptography<http://lists.randombit.net/mailman/listinfo/cryptography> >
_______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography