Ian G wrote: > In fact, it occurs (why didn't we think of this before!) that > CACert should do this: get together with those teams and > suggest they package the roots in there. As they are both > open source products, there is nothing stopping CACert from > doing this.
Except for the fact we don't just deal with mozilla products, although based on website stats we are getting > 50% from browsers sending mozilla headers... > This is a short term solution; but the future of browsing is > in those plugins. If there is increased interest in CA root > certs, then it is *only* because of the rise of phishing and > the worry that this causes in countries outside the USA, so > it makes sense to develop ones solution to phishing in a way > that makes a difference. My use of SSL has absolutely nothing to do with phishing and everything to do with a) preventing my passwords from easily being acquired by others that shouldn't have them or b) making it easier for people to snoop on my packets that shouldn't... I'd rank preventing the NSA from seeing my international traffic long before I'd give phishing a look in... -- Best regards, Duane http://www.cacert.org - Free Security Certificates http://www.nodedb.com - Think globally, network locally http://www.sydneywireless.com - Telecommunications Freedom http://happysnapper.com.au - Sell your photos over the net! http://e164.org - Using Enum.164 to interconnect asterisk servers "In the long run the pessimist may be proved right, but the optimist has a better time on the trip." _______________________________________________ mozilla-crypto mailing list [email protected] http://mail.mozilla.org/listinfo/mozilla-crypto
