|
Posted
over 15 years
ago
New Research Suggests That Governments May Fake SSL Certificates:https://www.eff.org/deeplinks/2010/03/researchers-reveal-likelihood-governments-fake-ssl
|
|
Posted
over 15 years
ago
Sophisticated X.509 certificate interception devices designed to collect encrypted SSL traffic based on forged 'look-alike' certificates: http://www.wired.com/threatlevel/2010/03/packet-forensics/
|
|
Posted
over 15 years
ago
LWN article on the business of SSL man-in-the-middle-attacks, the threat may be more practical than previously thought: http://lwn.net/Articles/380140/
|
|
Posted
over 15 years
ago
New Research Suggests That Governments May Fake SSL Certificates:https://www.eff.org/deeplinks/2010/03/researchers-reveal-likelihood-governments-fake-ssl
|
|
Posted
over 15 years
ago
Christopher Soghoian and Sid Stamm's draft research paper entitled "Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL" presents evidence that CAs may be cooperating with government agencies to help them spy undetected on "secure" encrypted communications: http://files.cloudprivacy.net/ssl-mitm.pdf
|
|
Posted
over 15 years
ago
A Tor developer writes about how he disables all Certificate Authorities on his system and instead selectively trusts those SSL certificates from individual websites: http://blog.torproject.org/blog/life-without-ca
|
|
Posted
over 15 years
ago
A Tor developer writes about how he disables all Certificate Authorities on his system and instead selectively trusts those SSL certificates from individual websites: http://blog.torproject.org/blog/life-without-ca
|
|
Posted
over 15 years
ago
Sophisticated X.509 certificate interception devices designed to collect encrypted SSL traffic based on forged 'look-alike' certificates: http://www.wired.com/threatlevel/2010/03/packet-forensics/
|