[153500] in North American Network Operators' Group
Re: LinkedIn password database compromised
daemon@ATHENA.MIT.EDU (-Hammer-)
Thu Jun 7 16:05:43 2012
Date: Thu, 07 Jun 2012 15:04:57 -0500
From: -Hammer- <bhmccie@gmail.com>
To: nanog@nanog.org
In-Reply-To: <CAEE+rGoxV3kVw5+Qy=zAM2ZzFE3NGCtHjjkUDWOs85Su9uAGgw@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
I gotta agree with Aaron here. What would be my motivation to "trust" an
open and public infrastructure? With my business or personal keys?
-Hammer-
"I was a normal American nerd"
-Jack Herer
On 6/7/2012 2:37 PM, Aaron C. de Bruyn wrote:
> On Thu, Jun 7, 2012 at 12:24 PM, Owen DeLong<owen@delong.com> wrote:
>>> Heck no to X.509. We'd run into the same issue we have right now--a
>>> select group of companies charging users to prove their identity.
>> Not if enough of us get behind CACERT.
> Yet again, another org (free or not) that is holding my identity hostage.
> Would you give cacert your SSH key and use them to log in to your
> Linux servers? I'd bet most *nix admins would shout "hell no!"
>
> So why would you make them the gateway for your online identity?
>
> -A
>
>