[cryptography] Request - PKI/CA History Lesson
marcus.brinkmann at ruhr-uni-bochum.de
Fri May 2 08:06:25 EDT 2014
On 05/01/2014 10:25 AM, Ben Laurie wrote:
> On 1 May 2014 08:19, James A. Donald <jamesd at echeque.com> wrote:
>> On 2014-04-30 02:14, Jeffrey Goldberg wrote:
>>> On 2014-04-28, at 5:00 PM, James A. Donald <jamesd at echeque.com> wrote:
>>>> Cannot outsource trust Ann usually knows more about Bob than a distant
>>>> authority does.
>>> So should Ann verify the fingerprints of Amazon, and Paypal herself?
>> Ann should be logging on by zero knowledge password protocol, so that the
>> entity that she logs on to proves it already knows the hash of her password.
>> ZKPP has to be in the browser chrome, not on the browser web page.
> This seems obvious, but experiments show users do not understand it.
> We have yet to find a satisfactory answer to a trusted path for
> ordinary users.
So where it really mattered we got two-factor authentication (by mobile
phone) instead. I like the trade-off. Using another untrusted path on
a different network and machine for a probabilistic guarantee seems more
reasonable to me than trying to build a trusted path on a single
machine, which was ambitious at the best of times, before we knew for a
fact that we can not trust a single embedded integrated circuit in any
device in the world. And that is not even considering the usability and
accessibility issues of all the fancy trusted path solutions that I've seen.
Security researchers can not even guarantee that the status light of the
camera is on when it is recording images.
More information about the cryptography