Hacker News new | past | comments | ask | show | jobs | submit login

or someone is going to stuff the signature in DNS like we seem to do for a lot of other items (e.g. SPF, DKIM)



If you're in a position to MITM a TLS connection, you can most likely also alter those signatures for your target.

You would need to use something like DNSSEC as well, relying on a government-controlled PKI [1], which isn't really any better than the current situation.

[1]: http://sockpuppet.org/blog/2015/01/15/against-dnssec/


The current situation is that everyone in the Starbucks can completely monitor all of your plaintext. Self-signed, encrypted, unauthenticated connections are better than plaintext connections.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: