Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment: Re:Abuse of power (Score 1) 324 324

This is done ALL THE TIME by too many entities to even count. The only time this is potentially bad is when it is done in self interest. This is clearly not the case here.
In this case, the encryption is not about asserting identity, it is about encrypting the data stream from point-to-point. This solves a lot of issues that currently plague the Internet as a whole while, at the same time, introducing new problems which will need to be worked out.
I believe this is a move in the right direction and can only help people be more secure, not less.

Comment: Re:Wait a minute... (Score 1) 324 324

This is really a separate issue though.
I am sure that most governments have at least once CA in their pocket these days.
And, really, no matter what system is in place, governments will always have wire-level access and all kinds of backdoor agreements with manufacturers.
This move is not intended to curb government surveillance though (although it does add at least one more barrier to the process).
The first step toward a more secure system is to get rid of the insecure parts.
Anyway, I am pretty sure the HTTP 2.0 standard is going to be secure by default so this is just getting ahead of the ball.

The computing field is always in need of new cliches. -- Alan Perlis