On 18/07/07, Scott Grayban <[EMAIL PROTECTED]> wrote:
> On 18/07/07, Michael Vincent van Rantwijk, MultiZilla
> <[EMAIL PROTECTED]> wrote:
> > XPI installations initiated from mozdev.org will still be vulnerable to
> > MITM attacks... when the XPI isn't *installed* originally from a SSL
> > protected server!
> >
> > a.m.o is secure, so in that case you can get away with simply signing
> > your updates, but each new installation will still be vulnerable to MITM
> > attacks, and this will be the next step in this process... to prevent
> > you from installing XPI's from insecure http: connections.
> >
> > Why is this so hard to understand?
> >
> > --
> > Michael Vincent van Rantwijk
>
> The repercussion of using java script to update the addons.
>
> Firefox has been well known to be the best sure web browser out there
> but this flaw takes FF right back to the IE stone age.

Opps typo..... should read "secure web browser".
_______________________________________________
Project_owners mailing list
Project_owners@mozdev.org
http://mozdev.org/mailman/listinfo/project_owners

Reply via email to