On Monday 09 Sep 2013 03:05:57 Michael Orlitzky wrote:
> On 09/08/2013 09:33 PM, Dale wrote:
> > Someone found this and sent it to me.
> > 
> > http://news.yahoo.com/internet-experts-want-security-revamp-nsa-revelatio
> > ns-020838711--sector.html
> > 
> > 
> > I'm not to concerned about the political aspect of this but do have to
> > wonder what this means when we use sites that are supposed to be secure
> > and use HTTPS.  From reading that, it seems that even URLs with HTTPS
> > are not secure.  Is it reasonable to expect that even connections
> > between say me and my bank are not really secure?
> 
> The CA infrastructure was never secure. It exists to transfer money away
> from website owners and into the bank accounts of the CAs and browser
> makers. Security may be one of their goals, but it's certainly not the
> motivating one.
> 
> To avoid a tirade here, I've already written about this:
> 
> [1]
> http://michael.orlitzky.com/articles/in_defense_of_self-signed_certificates
> .php
> 
> [2]
> http://michael.orlitzky.com/articles/why_im_against_ca-signed_certificates.
> php
> 
> Warning: they're highly ranty, and mostly preach to the choir in that I
> don't give a ton of background.
> 
> The tl;dr is, use a 4096-bit self signed certificate combined with
> pinning. It's not perfect, but it's as good as it gets unless you plan
> to make a trip to each website's datacenter in person.

Are you saying that 2048 RSA keys are no good anymore?

-- 
Regards,
Mick

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to