[OT] Re: Please fix subscribe at http://lists.wald.intevation.org/mailman/listinfo/gpg4win-announce
jays at panix.com
Fri Apr 19 00:18:39 CEST 2013
On Mon, 15 Apr 2013, MFPA <expires2013 at ymail.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
> On Monday 15 April 2013 at 2:54:19 AM, in
> <mid:Pine.NEB.4.64.1304142149510.15168 at panix3.panix.com>, Jay
> Sulzberger wrote:
>> What telephone number, what email address should I use
>> to help me make the decision as to whether to "trust
>> the site"? Whom should I speak to? What method do you
>> recommend to help me make the right decisions?
> You could look at the certificate your browser doesn't trust and
> follow up the information it contains. You could also search the
> internet (and other sources) for information about Intevation GmbH,
> and see if it matches what the certificate says. Depending how
> paranoid, you could even turn up at their offices and ask relevant
> Decide on the trust level you wish to establish for your intended use
> of the site. Then take whatever precautions you think are commensurate
> with that level of trust.
> Blindly clicking to dismiss the browser's "untrusted" warning is
> arguably no more irresponsible than blindly having the browser accept
> a certificate signed by a "certification authority" it recognises. I
> suspect if you were to look at the list of CAs trusted by your
> browser, you would encounter plenty that you see no reason to trust.
> - --
> Best regards
> MFPA mailto:expires2013 at ymail.com
MFPA, thank you for a very clear and useful answer!
I have just now read the Wikipedia article on X.509 and the article on SSL:
[page was last modified on 12 April 2013 at 06:34]
[page was last modified on 18 April 2013 at 09:31]
I read the standard documentation once, but I read it many years
ago, and I never wrote any code, nor ran any simulations of how a
"network" of X.509 certificates might work. There is much to
think about here.
Here is a short version of what I think is a good question:
Many people buy stuff from Amazon and other
companies/organizations/people by communicating over the Net.
For explame, people use credit cards. I believe that certain
data is in transit between the buyer and seller, and the reverse
too, encrypted, using as part of the communications stack SSL
(actually TLS nowadays, I think). I have the impression that
many people learn how to buy stuff by this method, that is, using
a credit card with SSL in the stack. But learning to use GnuPG
seems much harder to most people who have learned how to buy
stuff using a credit card over the Net.
Here are some pieces of my question:
1. Is the stack used for credit card use over the Net sufficiently "secure"?
Indeed this question is ill defined: "secure" for what, against what?
2. In what ways does the problem of email encryption differ from
the problem of encrypting credit card and other money-valuable
data in transit, with http as the transport protocol?
3. If the stack used for credit card use over the Net is good
enough for most purchases, could we use a similar stack to secure
email in transit? In particular, could we use a similar stack,
with a similar ease of learning and ease of use, as perceived by
most of the people who today buy stuff using a credit card over
> Change is inevitable except from a vending machine
> -----BEGIN PGP SIGNATURE-----
> -----END PGP SIGNATURE-----
More information about the Gnupg-users