On Feb 22, 3:56 am, Eddy Nigg <[email protected]> wrote:
> On 02/21/2010 09:34 AM, Nguyễn Đình Nam:
>
> > The way to solve it is not to inform people of each potential attack,
> > because there will be too many false positive, pushing people to just
> > ignore it, rendering the scheme ineffective. The way to solve it is to
> > let a small number of relevant and knowledgable people aware of the
> > incident...
>
> Chances that this will happen are almost nil I think.
I googled your name and I found
https://bugzilla.mozilla.org/show_bug.cgi?id=470897
So it did happened. Actually a CA abused the trust.
The proposed scheme is explicitly to prevent this case.

> there are privacy issues involved too if this would
> be in a default build. I guess it's not feasible.
I think it should be in the default build instead of an add-on. Yes
there is a small privacy issue: if the intrusion detection server is
malicious, it'll know each time a user establishes a secured
connection to somewhere else the first time, but not following
accesses. If the intrusion detection server is managed by the creator
of browser itself (in this case, it's Mozilla), the privacy issue is
solved.
-- 
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to