[16877] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A cool demo of how to spoof sites (also shows how TrustBar

daemon@ATHENA.MIT.EDU (Amir Herzberg)
Thu Feb 10 13:34:59 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 10 Feb 2005 09:52:06 +0200
From: Amir Herzberg <herzbea@macs.biu.ac.il>
To: Taral <taral@taral.net>
Cc: Ian Grigg <iang@systemics.com>, cryptography@metzdowd.com
In-Reply-To: <20050209190622.GA17685@yzma.clarkk.net>

Taral wrote:
> On Wed, Feb 09, 2005 at 07:41:36PM +0200, Amir Herzberg wrote:
> 
>>Want to protect your Mozilla/FireFox from such attacks? Install our 
>>TrustBar: http://TrustBar.Mozdev.org
>>(this was the first time that I had a real reason to click the `I don't 
>>trust this authority` button...)
>>
>>Opinions?
> 
> 
> Why should I trust you? Filtering xn--* domains works for me, and
> doesn't require that I turn my browser over to unreviewed, possibly
> buggy code.

Sorry if I was not clear: I don't propose you install TrustBar because 
YOU need it as a solution. Many people on this list are security/crypto 
experts, interested in finding good solutions (for all/many users, not 
just for themselves), and my message was for them. And yes, while 
TrustBar works fine for me and apparently quite a few others, the 
current code is only a research prototype (on the other hand, I had 
already the good fortune of seeing similar research code being adopte3d 
by many products... e.g. with our IP-Sec code).

Best, Amir
> 

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post