zlacker

[parent] [thread] 4 comments
1. keving+(OP)[view] [source] 2022-03-05 14:48:09
https certificates leak all the time and we still use https. Something is better than nothing. Now, is it worthwhile to use code signing certs to try and certify the identity of the author? Maybe not, it was slowly phased out for https. But we certainly need something because the alternative (just download and run whatever) was tried and definitely did not work out. We don't want grandma doing the equivalent of 'curl http://x | sudo bash' 4 times a week.
replies(3): >>blabla+5d >>hulitu+em >>Schroe+Q52
2. blabla+5d[view] [source] 2022-03-05 16:26:08
>>keving+(OP)
I don't get why companies that large would bother considering not using HSMs. Basically it's about public-key encryption, even if https is not ideal, it's quite a widespread implementation that can be sufficiently secure for many use cases
replies(1): >>keving+mL1
3. hulitu+em[view] [source] 2022-03-05 17:11:30
>>keving+(OP)
> We don't want grandma doing the equivalent of 'curl http://x | sudo bash' 4 times a week.

That's why we have web browsers running untrusted remote code.

◧◩
4. keving+mL1[view] [source] [discussion] 2022-03-06 03:30:44
>>blabla+5d
My understanding is that HSMs are a requirement, and the leaked certificate predates it.
5. Schroe+Q52[view] [source] 2022-03-06 08:43:32
>>keving+(OP)
You put they keys in the owner's hands with a method of changing them that can only he done with physical access.
[go to top]