[18552] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Defending users of unprotected login pages with TrustBar 0.4.9.93

daemon@ATHENA.MIT.EDU (Anne & Lynn Wheeler)
Thu Sep 22 23:00:32 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 22 Sep 2005 19:18:12 -0600
From: Anne & Lynn Wheeler <lynn@garlic.com>
To: "Axley, Jason" <jason.axley@wamu.net>
Cc: David Wagner <daw@cs.berkeley.edu>, herzbea@macs.biu.ac.il,
	cryptography@metzdowd.com
In-Reply-To: <81BDAEBB3ED1DB4B9A1D799880C93DA4024CEB6B@exmsea017.us.wamu.net>

Axley, Jason wrote:
> I think that this trades one security problem for others in the
> application security realm.  Sites that allow for equivalent functional
> duality in either HTTPS or HTTP protocols often suffer from problems
> where the HTTPS site inadvertently references an HTTP URL instead of
> HTTPS when doing something sensitive.  Most people won't notice the
> insecurity because the site "still works".  I prefer when applications
> break in insecure ways that they break loudly.

and the latest phishing
http://www.techweb.com/wire/security/171100298;jsessionid=EE0OXQCFILSOEQSNDBCCKHSCJUMEKJVN

New Phish Deceives With Phony Certificates

A new, advanced form a phishing dubbed "secured phishing" because it
relies on self-signed digital certificates, can easily fool all but the
most cautious consumers, a security firm warned Thursday.

... snip ...

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post