As certs will have to move to SHA-2 or above, that means the XP users won't be able to connect any more - not an issue as far as I am concerned
Some of us want to have a website to serve all paying customers, even if they use an old operating system.
Amazon is probably the best example - any browser can shop on Amazon, since long ago Amazon realized that annoying their customers with the latest buzzword ajax "responsive" junk doesn't sell their product.
Never mentioned anything about ajax or responsive etc, only about support for SNI. Also, but of selective quoting on the part about loosing XP customers, you forgot to include the bit where I said "would rather loose XP based people that those who use the latest Chrome builds etc and won't connect because of security alerts". - in other words if one of those two sets has to be lost for some reason, I would select to loose the older XP set. Obviously it would be best to loose neither, but given a enforced choice then the XP users are toast (and they count for less than 0.5% of our users, so really not going to loose any sleep over that)
Interesting, didn't know that XP doesn't support SHA-2. As certs will have to move to SHA-2 or above, that means the XP users won't be able to connect any more - not an issue as far as I am concerned (would rather loose XP based people that those who use the latest Chrome builds etc and won't connect because of security alerts).
Given this, does this mean we are getting close to a point where we can start using SNI - if people with systems that don't support SNI can't connect anyway because they also don't support SHA-2, then just go all in and switch to SNI anyway.
Are there browsers that do support SHA-2, but don't support SNI? If there are, are they a set that are actually worth worrying about?
Europol and the European Cybercrime Centre has been informed that a high-level suspected cyber criminal has been arrested. We can only refer you to the Russian authorities, they are the ones who should speak about this topic.
UCLA computer science professor Amit Sahai and a team of researchers have designed a system to encrypt software so that it only allows someone to use a program as intended while preventing any deciphering of the code behind it.
According to Sahai, previously developed techniques for obfuscation presented only a "speed bump," forcing an attacker to spend some effort, perhaps a few days, trying to reverse-engineer the software. The new system, he said, puts up an "iron wall," making it impossible for an adversary to reverse-engineer the software without solving mathematical problems that take hundreds of years to work out on today's computers — a game-change in the field of cryptography.
But, I have to ask... Icons? What you talkin' bout, Willis?
There is never time to do it right, but always time to do it over.