[36704] in bugtraq

home help back first fref pref prev next nref lref last post

Re: New whitepaper "The Phishing Guide"

daemon@ATHENA.MIT.EDU (Chip Andrews)
Tue Sep 28 12:15:02 2004

Message-ID: <41582300.3010706@sqlsecurity.com>
Date: Mon, 27 Sep 2004 10:26:08 -0400
From: Chip Andrews <chip@sqlsecurity.com>
MIME-Version: 1.0
To: Daniel Veditz <dveditz@cruzio.com>
Cc: bugtraq@securityfocus.com
In-Reply-To: <415469C6.2060400@cruzio.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

Agreed but forcing phishers to generate key pairs, purchase 
certificates, and/or buy-off CA vendor personnel creates additional 
audit trails that could help in the tracking and prosecution of those 
individuals. Combine this with certificate revocation and you have at 
least a model that gives more verification, auditing, and remediation 
than currently exists in the pursuit of these criminals. It's at least a 
step in the right direction and shouldn't be avoided simply because it 
won't immediately stop all phishing attacks or protect all users.

Watermarks do not stop all counterfeiting. Holograms do not stop all 
credit card fraud. It doesn't mean we shouldn't do what we can to help - 
even if its only a partial solution.

Chip Andrews
http://www.sqlsecurity.com

>How does that help in practice? A user fooled by a link to ebay-support.com
>is just as likely to accept signed mail from foo@ebay-support.com. Not to
>mention that the potential profits from phishing could easily finance the
>purchase of a forged cert if someone at one of the built-in CA's was
>corruptible. Given the several that are based in 3rd world companies (not to
>mention recent US corporate scandals) I have no confidence that won't
>eventually happen.
>
>-Dan Veditz
>
>
>  
>


home help back first fref pref prev next nref lref last post