On 10/16/09 13:05, Yavor Doganov wrote:

> More importantly, I fail to see what the problem is, really.  If the
> user is clueless enough and doesn't understand how to validate a
> certificate, what good it does if we choose a certificate that is
> included in a (popular) particular program?

I don't think this is about clueless users, and I find it pretty sad
that we're talking about people like that. Free software is for
everyone, and used by people who may seem clueless about this problem,
but it's because they've never had to deal with it before!

For me, this is about trust, plain and simple.

If users are doing things in a secure manner on the web, it should be
done over HTTPS, and that means paying the certificate folks for a real
certificate that is included in all the browsers people use.

I've had computer science professors not know what to do about the
Savannah error message and had to email my entire project and tell them
to manually add it.

<http://lists.gnu.org/archive/html/myexperiment-discuss/2007-03/msg00001.html>

It's acceptable for an internal demo, but totally unacceptable for a
public website with any significant project or number of users behind it
to do this.

We want people to trust the GNU project and the FSF. Broken SSL
certificates like this one, are just that -- breaking the trust
relationship between us and the general public.


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to