[16871] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A cool demo of how to spoof sites (also shows how TrustBar preventsthis...)

daemon@ATHENA.MIT.EDU (Adam Shostack)
Wed Feb 9 16:37:20 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 9 Feb 2005 16:06:27 -0500
From: Adam Shostack <adam@homeport.org>
To: Ian G <iang@systemics.com>
Cc: cryptography@metzdowd.com, cap-talk@zesty.ca
In-Reply-To: <420A62DD.3020808@systemics.com>

On Wed, Feb 09, 2005 at 07:22:05PM +0000, Ian G wrote:
| Adam Shostack wrote:
| 
| >Have you run end-user testing to demonstrate the user-acceptability of
| >Trustbar?
| > 
| >
| 
| Yes, this was asked over on the cap-talk list.
| Below is what I posted there.  I'm somewhat
| sympathetic as doing a real field trial which
| involves testing real responses to a browser
| attack raises all sorts of heisenberg uncertainty /
| experimental method issues.  Off the top of
| my head, I think this is a really tricky problem,
| and if anyone knows how to test security
| breaches on ordinary users, shout!

There's an HCIsec group at YahooGroups: 

http://groups.yahoo.com/group/hcisec/

Most of the smart people who care about these issues hang out there.  

Adam

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post