On Tue, Oct 25, 2011 at 6:32 PM, Ian Hickson <[email protected]> wrote: > Sure, there are specific cases where one is easier than the other. There > are also specific cases where it's easier to just send malware to the user > than attempt a passive attack. That doesn't mean that we should just > protect against malware and pretend that a passive attack is not a > problem, just like we shouldn't pretend that active attacks are not a > significant risk and thus should allow self-signed certs. >
I didn't say any of these things. I said encryption without a trusted signature is not useless. Encryption is always better than no encryption, whether or not you have a trusted certificate. Reducing the safe, undetectable, easily-scalable passive attacks is a significant win. (That doesn't mean the behavior in this particular case is wrong. Adam is almost certainly right: regular users have enough trouble with top-level certificates, and the subresource complication on top of that is probably too much. But please, stop equating unsigned crypto to cleartext.) -- Glenn Maynard
