On Mon, Feb 29, 2016 at 7:09 AM, Peter Gutmann
<[email protected]> wrote:
> Jürgen Brauckmann <[email protected]> writes:
>
>>Nice example from the consumer electronics world: Android >= 4.4 is quite
>>resistant against private PKIs. You cannot import your own/your corporate
>>private Root CAs for Openvpn- or Wifi access point security without getting
>>persistent, nasty, user-confusing warning messages: "A third party is capable
>>of monitoring your network activity".
>>
>>http://www.howtogeek.com/198811/ask-htg-whats-the-deal-with-androids-persistent-network-may-be-monitored-warning/
>
> Ugh, yuck!  So on the one hand we have numerous research papers showing that
> Android apps that blindly trust any old cert they find are a major problem,
> and then we have Google sabotaging any attempt to build a proper trust chain
> for Android apps.

Not just Android. Windows has all sorts of cool cert chain building
algorithms in their APIs. But they require the certificates to be
installed in the machine cert store.

Which makes them totally useless for my purposes in the Mesh as the
point is to give users a personal PKI with themselves as the root of
trust.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to