Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re:Hope for Hurd yet? (Score 1) 83

Still going, and you can get a Debian distro. They've got rid of that 2 Gb limit on disk (originally it was linked to the addressable RAM), but it's still 32 bit and things like USB don't seem to be there yet. Most people seem to be running it in emulation rather than on the metal..

Comment Re:Space Patrol Unsatisfactory (Score 1) 180

We have several security measures, so it is not possible to make a good forgery. However a significant proportion of our £1 coins are conspicuous forgeries and still circulate, so a forgery doesn't need to be good to be viable. I'm pretty sure that starch-free paper with the same handling feel would be enough to pass muster for many purposes, if you could get a photocopier to work with them.

Comment Re:Like all One-Size-Fits-All approaches.. (Score 1) 243

Again: I am unaware of any auditing requirements. What auditing do you believe takes place, who is placing the requirements, and what is your source for this information?

In respect of dual signature, the key word is "green" - this would be appropriate for validated domains such as banks, not necessarily for all hosts.

An advantage of a WoT model is that it is possible to give partial trust to different signers, and set a policy to trust a site once there are enough partially trusted supporters for it. This means that the system need not be fragile to a lapse in a single signer. At base though, you can have something exactly equivalent to the current single-signer model by issuing the root public certificates for the current CAs with the operating system.

Comment Re:Like all One-Size-Fits-All approaches.. (Score 1) 243

As far as I know, it is not true to say that CAs are audited, and in fact there are well-known problems with CAs signing stuff that they shouldn't.

An advantage of the web of trust model is that you can incorporate CAs as parties that you trust (exactly as for the current model), but you can also require multiple signatures, which as far as I know is not possible with the current model. You might, for instance, require that two of the current CAs have signed a certificate before it lights up as "green" in a browser URL bar.

Comment Why is googlecode used? (Score 1) 179

I use NoScript. The demo site requires code from googlecode.com to be permitted. While the Javascript provided by Google may be innocuous, I would personally not make this assumption. I don't think that it would be possible for it to get the private key, but I would suspect that it would do datamining which would reveal the email addresses in use.

Slashdot Top Deals

FORTRAN rots the brain. -- John McQuillin

Working...