Hacker News new | past | comments | ask | show | jobs | submit login

But what good is encrypted communication if you cant be sure who you are communication with?



It is good because that way you know that nobody in between can see your traffic. And more often than not it is enough to know that you are talking to the same site you talked to the last time (just like with SSH). The idea of "no lock icon" in case of a self signed/unknown CA certificate is a really good idea IMHO. The traffic is encrypted, but it does not give the user a false sense of security.


If you don't know who you're talking to, then there is no point in encrypting the data, because you're probably talking to the attacker. ("Man In The Middle")

Now, the idea of "I'm talking to the same person I talked to last time" is useful, but if the users are all conditioned to accept random certificates without understanding, then when they go back a second time (and the attacker is waiting), they'll agree to the new cert, just like they did the first time.


If you create an account on happykittens.com, you don't really care if the cert happykittens.com is sending you is signed by a trusted CA. What you care about is that the second time you visit the site, when you log in with your brand new account, that the cert the site sends you is the same you received when you created the account (the site is the same you created the account on). This has nothing to do with the fact that the cert is signed from a trusted CA or not, and thus, making it difficult for the user to accept a SS cert is not the right solution IMHO.


Key continuity is a fine answer to this problem. Just come up with a way to provide it on every device every user might reasonably want to log in from, for every site on the Internet.


If you've ever run an e-commerce site, you'll know that payments drop off significantly when browsers start throwing up warning signs.


Which is good, because without that dropoff, your customers security would be an externality to you.


Regardless, it's still better than straight HTTP.

HTTP < Encrypted HTTP < Encrypted,signed HTTP


Actually, no. For all practical intents and purposes encryption w/o authentication is as good as no encryption.

Unauthenticated encryption is 'better' than a plaintext in just one thing - it protects against passive snooping. Anyone willing to splice the connection will have full access to all your plaintext data and you won't even know about it. As such it's nothing more than an equivalent of reversible traffic obfuscation.

So if your "better" meant "obfuscated", then, yeah, it's better. But it's no more secure (in a conventional security sense) than a plaintext.


What good is verified communication when you can buy an SSL cert with pretty much any fake information you want.


No good at all. Which is why you can't buy an SSL certificate that claims to be onlinebanking.bankofamerica.com.


I'd like to know where I can buy a cert this way. Pretty please.


All that's require are scanned documents. And these documents can easily be tampered with or photoshopped. You may think your company details are checked before the cert is issued, but that's crap. We email our docs to a US company, and all the docs are issued by Irish government departments. There's no way in hell that some guy in what amounts to a call centre in the US has access to any Irish database to prove or disprove their validity. SSL certs are a crock of shit - all you need to do to get one you're not entitled to is to be slightly outside the norm, and claiming any small country as your location is good enough for that. Hell, you could make up your own government departments and documents, and that'd be good enough for must of these companies.


Give me a break. This is like saying all online security is a sham because I can always physically break into your office. You know how many times a real CA has fucked up and accidentally issued a Bank of America certificate to organized criminals in Estonia? ZERO.


You can say it's crap all you want, but until you've worked inside a CA and seen what goes on - you know shit. Good luck ordering a cert with your 'shopped docs...


You can't. Seriously, try it. You can't get a 'proper' cert unless you go through the background checks. You can't get a domain-only validated one unless you control the domain.


Mainly it means that your employer/ISP/someone else using same lan/wifi etc can't sniff your packets.

Encryption is useful, and separate to identity verification.


Encryption is nothing without identity assurance. If you don't know who you're sending the encrypted data to - why bother encrypting in the first place?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: