[163] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: what are realistic threats?

daemon@ATHENA.MIT.EDU (Nick Szabo)
Fri Sep 30 06:16:36 1994

From: szabo@netcom.com (Nick Szabo)
To: masinter@parc.xerox.com
Date: Thu, 29 Sep 1994 21:25:11 -0700 (PDT)
Cc: hallam@dxal18.cern.ch, www-security@ns1.rutgers.edu
In-Reply-To: <94Sep29.094804pdt.2760@golden.parc.xerox.com> from "Larry Masinter" at Sep 29, 94 09:47:55 am
Reply-To: szabo@netcom.com (Nick Szabo)


> But what are they signing? 

Indeed, some of these "certification" schemes are quite silly --
they simply rely on the assumption that we're supposed to be
impressed.  They are, quite literally, a lot of noise signifying 
nothing.

As far as software distribution goes, by far the best guarantee
that it hasn't been tampered with is the digital signatures of the 
authors themselves.  A signature by someone who hasn't closely 
examined the code is quite a piece of lunacy, but I bet there will be
plenty of suckers out there who will be impressed by some particular
well-hyped chop.

Nick Szabo				szabo@netcom.com

home help back first fref pref prev next nref lref last post