[messaging] Google End-to-End plans on using key directories with a CT-like verification protocol

Tao Effect contact at taoeffect.com
Fri Aug 29 11:26:44 PDT 2014


On Aug 29, 2014, at 10:36 AM, Ben Laurie <ben at links.org> wrote:
> I haven't seen evidence that you checked the website the day prior.
> I'm not sure how you would provide such evidence, either, but it does
> occur to me that the tool you were using would be usefully enhanced by
> showing when the old cert was last seen...

If I could be assured that it was worth my time, I could dredge up Time Machine backups from that period and view my firefox browsing history to provide the needed proof.

>> That is why I prefer systems that prevent MITM attacks from happening
>> in the first place, and without any ambiguity.
> 
> I don't know how to achieve that.


Is that in reference to things like HeartBleed (private key compromise, etc.)?

Here's the reason why this is a false choice (if that's what you're referring to):

- Private key compromise / backdoors / bugs are pretty much the only way that MITM can happen with DNSChain / blockchain-based auth.

- Certificate Transparency allows that, plus mass-MITM (global) surveillance.

Preventing mass-MITM as much as possible is what I was referring to by "prevent MITM attacks from happening in the first place".

Kind regards,
Greg Slepak

--
Please do not email me anything that you are not comfortable also sharing with the NSA.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://moderncrypto.org/mail-archive/messaging/attachments/20140829/12d90f6b/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 841 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://moderncrypto.org/mail-archive/messaging/attachments/20140829/12d90f6b/attachment.sig>


More information about the Messaging mailing list