[153500] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: LinkedIn password database compromised

daemon@ATHENA.MIT.EDU (-Hammer-)
Thu Jun 7 16:05:43 2012

Date: Thu, 07 Jun 2012 15:04:57 -0500
From: -Hammer- <bhmccie@gmail.com>
To: nanog@nanog.org
In-Reply-To: <CAEE+rGoxV3kVw5+Qy=zAM2ZzFE3NGCtHjjkUDWOs85Su9uAGgw@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

I gotta agree with Aaron here. What would be my motivation to "trust" an 
open and public infrastructure? With my business or personal keys?

-Hammer-

"I was a normal American nerd"
-Jack Herer



On 6/7/2012 2:37 PM, Aaron C. de Bruyn wrote:
> On Thu, Jun 7, 2012 at 12:24 PM, Owen DeLong<owen@delong.com>  wrote:
>>> Heck no to X.509.  We'd run into the same issue we have right now--a
>>> select group of companies charging users to prove their identity.
>> Not if enough of us get behind CACERT.
> Yet again, another org (free or not) that is holding my identity hostage.
> Would you give cacert your SSH key and use them to log in to your
> Linux servers?  I'd bet most *nix admins would shout "hell no!"
>
> So why would you make them the gateway for your online identity?
>
> -A
>
>


home help back first fref pref prev next nref lref last post