[153498] in North American Network Operators' Group
Re: LinkedIn password database compromised
daemon@ATHENA.MIT.EDU (Aaron C. de Bruyn)
Thu Jun 7 15:39:13 2012
In-Reply-To: <56F14D89-FCD8-4ECB-9FC0-6E2A8A9A666F@delong.com>
From: "Aaron C. de Bruyn" <aaron@heyaaron.com>
Date: Thu, 7 Jun 2012 12:37:50 -0700
To: Owen DeLong <owen@delong.com>
Cc: Nanog <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Thu, Jun 7, 2012 at 12:24 PM, Owen DeLong <owen@delong.com> wrote:
>> Heck no to X.509. =C2=A0We'd run into the same issue we have right now--=
a
>> select group of companies charging users to prove their identity.
>
> Not if enough of us get behind CACERT.
Yet again, another org (free or not) that is holding my identity hostage.
Would you give cacert your SSH key and use them to log in to your
Linux servers? I'd bet most *nix admins would shout "hell no!"
So why would you make them the gateway for your online identity?
-A