Ian G wrote:

> In fact, it occurs (why didn't we think of this before!) that
> CACert should do this:  get together with those teams and
> suggest they package the roots in there.  As they are both
> open source products, there is nothing stopping CACert from
> doing this.

Except for the fact we don't just deal with mozilla products, although
based on website stats we are getting > 50% from browsers sending
mozilla headers...

> This is a short term solution;  but the future of browsing is
> in those plugins.  If there is increased interest in CA root
> certs, then it is *only* because of the rise of phishing and
> the worry that this causes in countries outside the USA, so
> it makes sense to develop ones solution to phishing in a way
> that makes a difference.

My use of SSL has absolutely nothing to do with phishing and everything
to do with a) preventing my passwords from easily being acquired by
others that shouldn't have them or b) making it easier for people to
snoop on my packets that shouldn't...

I'd rank preventing the NSA from seeing my international traffic long
before I'd give phishing a look in...

-- 

Best regards,
 Duane

http://www.cacert.org - Free Security Certificates
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
http://happysnapper.com.au - Sell your photos over the net!
http://e164.org - Using Enum.164 to interconnect asterisk servers

"In the long run the pessimist may be proved right,
    but the optimist has a better time on the trip."
_______________________________________________
mozilla-crypto mailing list
[email protected]
http://mail.mozilla.org/listinfo/mozilla-crypto

Reply via email to