Convergence, (in-browser) certificate pinning, and a few more. You could
also use DNSSEC to serve the certificate.


2013/6/30 James A. Donald <jam...@echeque.com>

> The biggest Tor vulnerability is that governments and large criminal
> organizations (but I repeat myself) can use their influence over a CA to
> perform a man in the middle attack.
>
> I don't think they are doing this (as I said, they only bother with the
> low hanging fruit) but they could.
>
> Is there a tool that detects changes of CA?
>
> ______________________________**_________________
> cryptography mailing list
> cryptography@randombit.net
> http://lists.randombit.net/**mailman/listinfo/cryptography<http://lists.randombit.net/mailman/listinfo/cryptography>
>
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to