Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Kill CC instead (Score 1) 366

why not just put them all in the "To:" field?

A, B and C organize an event together. A asks B to do some action item, and wants C to know (so that C doesn't need to worry that it might have been forgotten). A would put B into To: and C into Cc:

Comment Re:BCC still existed? (Score 1) 366

BCC recipients are not shown to anybody. However, BCC recipients will see the other (non BCC) recipients. So yes, the above scenarios could happen (... unless the boss' e-mail client is smart enough to put up a warning when replying to a Bcc'ed mail...)

Comment Re:Nope (Score 1) 366

Your mom doesn't cause your server to broadcast your ssh password to the world. It's still safe for you to use ssh, even if your mom doesn't

However, the "facebook mindset" causes Bcc'ed people not to notice that they are bcc'ed, and so they may goof up where they shouldn't. Which makes Bcc a dangerous feature to use if you don't know for 150% percent sure whether the Bcc'ed guy is still a true geek, or has fallen into the "facebook mindset".

Comment Re:Pathetic (Score 1) 302

I don't trust Verisign neither, that doesn't mean i remove it's root certificate,

Surprise: as long as you keep trusting Verisign's root certificate, they are in a position to facilitate man-in-the-middle attacks on you communicating with any SSL website, even those that were signed with a different CA to begin with.

a valid certificate is not sign to blindly trust the other end of the connection.

... and that's not the point of a certificate.

The point of a certificate is that you can trust the connection (i.e. that no third party listens in), it has zilch to do about trusting the other end of the connection (i.e. that the website isn't trying to rip you off).

Comment Re:Pathetic (Score 1) 302

owning a legit certificate is no guarantee that the business holden the certificate is legit.

And it was never supposed to be. Just like a tamper-proof phone line is no guarantee that everybody with whom you speak over that line is trustworthy.

Certificates only makes sure that no unauthorized third party listens in on your communication with the certificate-protected website. It doesn't say nothing (and really nothing) about the trustworthiness of the website itself.

Comment Re:Pathetic (Score 1) 302

I don't trust locks, they can be picked. I just leave all my doors unlocked because they're pointless anyway.

Actually, with shoddy locks, only those things that they lock can be compromised.

If you've got a shoddy lock on your luggage, it doesn't compromise the security of your front door and vice-versa.

With CA's, it's worse: if you're trusting one bad CA in your browser, this not only compromises communications with sites signed by that CA, but communication with any SSL site.

Indeed, if your bank is signed by Geotrust, a man-in-the-middle could just bribe (or trick) Verisign to give him a certificate for your bank (signed by Verisign), and your browser would accept it (unless you've got the certpatrol addon, which warns you if certificates change issuer for no good reason).

Comment Re:Is the US any better? (Score 1) 214

Enjoy the SS visit.

How do you know that no known priors even lives in the US? Maybe he is posting that from the safety of Europe, and never intends to travel to the US? And moreover, Slashdot respects its users' privacy, and will never hand over details to the SS. The only entity that they ever hand details over to are the clams

Yes, that's right: you get into more trouble saying that a galactic despot named Xenu decided 75 million years ago to kill a bunch of people by chaining them to volcanoes and dropping nuclear bombs on them, than saying that you will kill Obama using some poisoned feijoada during his visit to Brazil in March.

Slashdot Top Deals

Old mail has arrived.

Working...