Xplo Eristotle wrote:

> the majority
> of the interface you describe is going to be utterly meaningless to the
> majority of Mozilla's users (IMHO)

That's true for many prefs. It might even be the nature of prefs.

> and has nothing really to do with
> the function of a browser

*ring* Mozilla is not just a browser. It is also an email client.

>>     2. If you just want to transfer your credit card number to a web shop
>>        without anybody listening, you have to understand only a fraction
>>        of PSM and its UI.
> 
> Which fraction would this be?

Somebody else might want to answer this.

> And when in the past (if at all) have
> users been required to understand this fraction

Always, whenever they used SSL intentionally. (SSL was introduced in 
Navigator 1.0, IIRC.)

> and if they were, how
> were they made to understand it?

That's an entirely different problem.

E.g. by this text of the Security Info page: "The identity of this web 
site has been verified by [EMAIL PROTECTED][...], a certificate 
authority you trust for this purpose - not by mozilla.org."

User education (in Mozilla) can probably improved, but that's unrelated 
to our discussion of what options to include in the PSM prefs.

> If I need to mess with some sort of
> preferences, and the phrase "and its UI" leads me to believe that I do,

"its UI" primarily refered to the "Security Info" page you get after 
clicking on the lock icon.

You are also supposed to adjust the trust in certs. This assumes you 
know what certs and CAs are, how trust is propagated. You also have to 
know what happens when https is used and how servers are authenticated 
(not the technical details, but the principle).

> how will I know which part to mess with

That's a good point. Any suggestions?

>> I'm sorry, but this shows that you are lacking even enough knowledge for
>> the 2. task above.
> 
> I'm afraid not, since I have *done* #2, above.

But it might not have done what you thought. E.g.

    * you probably assumed that nobody else can listen. But if 40 bit
      encryption was used, this assumption may be wrong.
    * You might have assumed that <https://www.barnes-and-noble.com> is
      managed by the well-known Barnes and Noble, while in fact it might
      be Evil Guy Corp.
    * You might have assumed that if a CA (e.g. Verisign) states that
      <https://www.barnesandnoble.com> is managed by Barnes and Noble,
      that this is in fact true. But Verisign might be so keen on money
      that it issues wrong certificates, if paid enough. Or they are
      clueless and a cracker broke in their network and was able to sign
      arbitary certs with the CA cert. Or the CA Bin Laden deliberately
      issues wrong certs to bombardize eCommerce.
      (I admit, this last problem is a bit made-up.)

> What this indicates to me is that this aspect of browser security can be
> made transparent (or nearly so), since it has been already.

As shown above, this is wrong.

> let alone
> sifting through what seems to be an excessively complex and arcane UI to
> do it...

OK, if it is *excessively* complex and arcane, this needs fixing. But I 
fear that most of your points don't help with that task, because you are 
basically saying that almost all UI for PSM should be removed completely.

[smart card details]

> If I'm not supposed to
> understand that here, then why am I expected to understand it in the UI,

You aren't.

> even if the correct thing to do is ignore it?

If you don't understand a pref, the correct thing is to ignore it. That 
is the priciple of almost all prefs in all apps.

> Security through obscurity
> is an exceptionally poor design philosophy, IMO.

*ring* Quote used in the wrong place.

>>  > Shouldn't the OS be handling all of that?
>> 
>> What, if the OS doesn't?
> 
> You're telling me that the OS can't handle a peripheral and its driver,
> despite being designed for that purpose?

s/can't/doesn't/. Or where in [insert your favourite OS] do you find the 
kind of management functions Mozilla and 4.x have for smart cards and 
their readers?

Smart card readers are connected via the serial or parallel ports of the 
computer. Is has always been this way that applications manage the 
devices that are connected there and that the OS doesn't provide special 
functions for.

> If you still don't know why after reading this far, I strongly suggest
> you find outside help for both your UI design and your user studies,

Note: I am not a PSM programmer. (If you don't count my UI and build 
patches.)

> because you are obviously missing the point.

Your point seems to be "I want to use this without prior knowledge, 
without external help and without reading the manual" (since Bob said 
that help is on the way). This point is wrong for browsers, computers in 
general and just as much so for PSM.

[quality meter]
I'm not arguing about that, because almost everybody else seems to agree 
that it is a good thing.

> Will Mozilla
> inform me that the server I'm trying to connect to uses only weak crypto
> and that I need to turn the weak crypto back on?

Somebody else can answer that?

> How difficult would it be to have an
> error dialog that gives the user the option or temporarily re-enabling
> the weak crypto without having to go into the preferences and change
> them?

Good suggestion.

Reply via email to