Gerv,  Your web page http://www.gerv.net/security/link-fingerprints/
doesn't provide any obvious channel for feedback or public discussion
of that proposal, that I can see.  So, I'm using this channel.

The page makes certain claims that I don't believe.  Here's one.

> To substitute a trojan, the attacker would need to hack both the download
> site and the website supplying the information - or the user's mailbox.

Unless the page that contains that link is an https page, to substitute a
trojan, an attacker need only substitute his own URL for the original
page's URL while the page is in transit.  A proxy server is a perfect
place to perform such an MITM attack.  Http pages with login forms that
submit their contents via https have the very same vulnerability.

-- 
Nelson B  (On vacation and not reading mail or news until July 2)

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to