> Anyone could grab the private key from the github repo or npm tarball
and use it to decrypt communications with servers configured this way.

Is that true?  I thought the certificate was only used to verify that the
server was the actual one it claimed to be.  The encryption is something
different.

It is true that a man-in-the-middle could intercept the initial connection
and pretend that it is the desired site.  But I don't see how that could
happen if someone installed the serve and went directly to it, even from a
remote browser.

-- 
-- 
Job Board: http://jobs.nodejs.org/
Posting guidelines: 
https://github.com/joyent/node/wiki/Mailing-List-Posting-Guidelines
You received this message because you are subscribed to the Google
Groups "nodejs" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/nodejs?hl=en?hl=en

--- 
You received this message because you are subscribed to the Google Groups 
"nodejs" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to