Hi Jean Marc,

Jean-Marc Desperrier wrote:
>
> How effective has this approach been until now to block spam and spyware 
> ? 
Errrr...how many times did you encounter and installed signed spyware 
and adware on your computer? I guess close to zero!
Would all software one installs be singed by a verifiable certificate, 
this wouldn't be an issue altogether. Instead users are trained to click 
through the various pop-ups and warnings when installing something on 
their computer...
> Is it really that difficult to identify those responsible for it, 
> especially in the case of spamware,
If everybody would use S/MIME signatures and refuse any non-signed mail, 
it would improve the spam problem a lot. Additionally mail server could 
work in TLS mode only to further reduce this problem.
>  do you really think it's much harder 
> to escape reliability after buying a signing certificate than to escape 
> it when operating a large scale spam platform ?
Yes! First of all it would make casual users aware of certificates, 
second you could trace such attempts much easier. Remember, the crooks 
go the easiest way always...
>  How hard and how long 
> will it be to convince a judge take the right decision between one 
> side's "spyware" and the other's "innovative marketing technic" ?
>   
That would be an interesting question indeed, but at least you know to 
whom you are talking to. I assume  that code signing is only issued 
after reasonable verification (at least).
>> So it seems that you are suggesting that we should issue code-signing 
>> certificates to anyone who wants them, and use revocation to pull out 
>> the bad actors?
>>     
>
> In short yes. Just that it's not to anyone who wants them, you have the 
> final say to who gets them, and if you experimentally find out you have 
> to be very restrictive to avoid a bad experience for your users, then 
> you'll just do that.
>   
That's about they same (failed) approach of blacklisting mail servers, 
phishing web sites etc...
>
> And in this case, the 
> seriousness of the CAs and the effectiveness of the legal threat are 
> your only lines of defense. 
>   
But perhaps the best one? What if YOU failed to detect a serious problem 
in the code and YOU issued a certificate for that application? You'll be 
liable under certain circumstances for damage! Remember you suggest to 
review the code, not verify the identity!
> Of course you can also choose to make deals to only accept a few 
> selected commercials CA for which a highly effective revocation channel 
> will be in place (in addition to a high quality identity review process, 
> and only accepting requests from selected countries where the legal 
> threat will be effective).
Which perhaps will shut out most developers, specially the latest 
condition of "selected" countries...not speaking about costs even...

-- 
Regards
 
Signer:      Eddy Nigg, StartCom Ltd.
Jabber:      [EMAIL PROTECTED]
Phone:       +1.213.341.0390
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to