Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:If anyone actually cared... (Score 1) 710

In some cases it can be more expensive for the environment to make things last. For instance, it can be logistically more efficient to manufacture more weak products instead of distributing massive amount of spare parts. Fixing things needs to meet the QoE of buying new instead of the huge waiting times commonly associated with fixing old. In addition, people buy lots of stuff to just collect dust (freedom of choice and all that), if we continue consuming as we do now, and increase the strength of the products in majority of the cases it would count to nothing.

Comment Re:Moving goal posts (Score 1) 220

Currently TLS CA model tries to accomplish, identification, encryption, and trustworthiness assessment all at once. Encryption you can get with the self signed certs, domain based identification with something like DANE, and I suppose that CA model could scale to the sites requiring the trustworthiness assessment, e.g. banks and some large websites, which need to secure the binding with their real world presence.

Comment Re:Temporary RSA keys? (Score 2) 51

Generating RSA keys is more costly than, for example, ECDH keys. Checks for primality for the p and q, are needed for it to be secure for RSA. In my understangin, any big enough integer is a valid DH private key.

Static RSA would be nice for certain applications, since it is computationally cheaper to do for the client. Also, with DANE for instance, the same primitives can be used to check signatures. Yet, RSA might be costly in the future keylengths. For instance, some say that 256-bit symmetric keys are equivalent with 15k RSA keys.

Comment Re:I don't think the IETF woke up at all... (Score 2) 52

From what I understand from the RFC, the proposal is actually trying to protect from local eavesdropping when accessing http-resources. I.e. you define a trusted proxy, and use HTTP2 with TLS to access insecure HTTP resources through it. This does not offer end-to-end security, but offers protection for the user against local adversaries, such as their ISP.

Comment Certificate Transparency (Score 5, Informative) 233

Certificate transparency is a new project initiated at least partly by Google's engineers, which intends to solve this problem with SSL trust model: http://www.certificate-transparency.org/
It uses an append only public log, similar to Bitcoin transaction log to make certificate information public.

Comment one size may not fit all (Score 2) 234

I think that this improves password usability and is a move to the right direction. Others should follow instead of making passwords even harder for the end users, the most insane counter examples are the websites that mask your username as well. However, there really should be a switch to toggle this behavior.

Comment Re:My question about Convergence (Score 1) 127

Convergence seems to solve the problem of a government (Iran) placing fake certs in front of their users and decrypting their GMail and FB SSL connections, and what have you. But what if the fake cert is placed much closer to the target website which is being spoofed?

That could be mitigated by having at least one notary running DNSSEC, but then you can't have a consensus, you have to have all notaries agree, and require the DNSSEC one to agree. This would work, but in that case, just use DNSSEC (Which I do /not/ like the idea of on its face).

...Or some notaries could use the current CA system. The point is _trust agility_ and that you if you employ these certificate checks as an extra measure, you can not be in a worse situation than with the current CA system. In a nutshell: You don't have to trust CAs, you don't have to trust DNSSEC and you don't have to trust notaries that just compare certificates. But you can choose to trust them if they agree (and even if they don't).

Comment Re:OS design fail (Score 1) 150

But to use for security? That's as lame as installing anti-virus software because you know your OS can't handle security.

I've said for some time that anti-virus is not security. It is damage control, at best.

Damage control is security at its finest. We do not aim for the theoretically secure and perfect locked-down-restricted-with-airgap situation if implementing that security would be more costly than the damages in case of a compromise.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...