4 posts • joined 26 Aug 2011
Re: Why can't they use their own, internal certificates?
Sure they can use their own, Internal certificates. But, regardless of the arguments about data protection / snooping whatever: issuing a certificate in the name of Google when you have no authority to do so is plain fraud.
Verified by: your boss.
It's a joke, and a lie.
What's worrying here is that it wasn't internal certificates, it was much worse. It was a certificate vendor who's certificates are trusted by the majority of browsers worldwide.
Re: DL0: 167300 g (Air traffic control)
UK Air traffic control retired their (last) PDP11 in 2006. It is on display at the National Museum of Computing at Bletchly Park.
Crypto wouldn't have helped
Alice has her e-mail client set up to send encrypted messages to Bob, and Stoke city council. She writes a message to Stoke City council, but sends it to Bob by mistake.
So her mail client, being clever, encrypts it for Bob. So, Bob can decrypt it (because Bob is allowed to decrypt mail that's been encrypted for him right?), and sees a confidential message that should have been sent to Stoke.
To put this in the context of PGP encryption. Alice would have a public key for Bob and a public key for Stoke. If she sends a message to Bob using, say, Thunderbird, then Thunderbird will select Bob's key, because it will naturally be unaware that Bob isn't the intended recipient.
Video doesn't work in Firefox...
Indeed I can confirm this, doesn't work on my Firefox 6 on 64-bit Linux.
Works with Chrome though.
- Updated Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
- Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
- Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
- FOUR DAYS: That's how long it took to crack Galaxy S5 fingerscanner
- VMware reveals 27-patch Heartbleed fix plan