On Fri December 26 2008, Edward Diener wrote:
>
>  From what others have written, I feel that I am right and coming up 
> with elaborate schemes of hiding the client certs from the end-user 
> until thay are actually going to be used by client application code in 
> making the connection is largely a waste of time. Instead we should be 
> ensuring that the server database and its data are protected from the 
> prying eyes of a destructive hacker.
> 

Yes, we are all on that same page.

Sorry if my choice of words may have sounding insulting, it was not my intent.

Presume the worst case, that all _communications_ security has failed -

Now, look at what you can do in the environment you control, the server(s),
to keep the information stored secure - whatever "secure" means in your
application of an information storage system.

If not already part of your delievered application, plan on some sort of
client-awareness guide to policies they should implement at their end.

End-to-end security always includes good client polices and practices.

I can't be anything other than general, since I don't have the specifics.
Again, I do not intend to be insulting by being general.

Mike
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to