Daniel Dreymann wrote:
> 
> CertifiedEmail is a third- party signature system. First we accredit
> senders to establish wether they are good players with a good email
> reputation. Then, once they are accredited, we certify *individual*
> messages,

But this initial accreditation is done once.

> i.e. senders request
> a "token" which includes our signature for every message they desire
> to send. This provides us with real-time control which is necessary to
> ensure CertifiedEmail is not abused.

If I understand this correctly this is a privacy night-mare BTW...

> CertifiedEmail has built-in real-time security
> mechanisms not available to a bless-and-forget CA.

Well, it really depends on whether, why and how quick you revoke the 
initial accreditation. So the same authenticity issues arise like with 
what you call a "bless-and-forget CA". It depends on the security 
measures really deployed, during the whole certification lifecycle. And 
yes, unfortunately I also mistrust some of the CAs out there. But this 
is not a technical issue and therefore cannot be solved by yet another 
digital signature format/protocol.

Ciao, Michael.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to