Eddy's gone ahead and sent a signed PDF, according to a later message
in-thread.  I expect that it'll work without a hitch, though I would
like to hear of any anomalous behavior. :)

But, I'm struck again by a couple of questions.

Why does everything have to have an explicit 'threat model' before
cryptography can be applied?  In my view, cryptography is useful for
MUCH more than just "protecting against potential attack".  (It's not
like we're trying to protect secrets with national security
implications.  It's not like we're trying to protect a financial
instrument.  It's not even like we're trying to keep an affair
secret.)

As I've said before, I view cryptography as a means of associating a
policy with data.  The policy in this case would be: this is a
document version that someone working on behalf of Mozilla (currently
-- and with the tenacity and thoroughness she's exhibited, hopefully
for a LONG time -- Kathleen) prepared, it hasn't been corrupted, and
it's got a timestamp so that later revisions can be identified as
such.  Cryptography can give me a very good idea that these three
concepts can be relied upon.

It doesn't have to be a "legal document".  It doesn't need a
contract-grade (i.e., Qualified Certificate in PKIX and EU parlance)
signature on it.  All that I need to know is that what I'm reading is
the actual working document with a means of determining if there's a
newer one, and a digisig countersigned by a timestamp authority is a
perfect means of accomplishing this.

Why does it have to be any more complex than this?  Why does there
have to be any more "meaning" assigned to the act of digitally signing
something?  (Why do we always treat the concept of digital signatures
as though we're signing away our firstborn?  What are we so afraid of?
 That fear-among-the-experts is part of what makes cryptography so
inaccessible to the common user, and reduces confidence in the system
-- which leads to a lack of use, which leads to a dearth of innovation
in application.)

-Kyle H

On Wed, Dec 17, 2008 at 11:14 AM, Frank Hecker
<hec...@mozillafoundation.org> wrote:
> Kyle Hamilton wrote:
>>
>> Actually, the 'threat model' is more related to versioning (via
>> timestamp) than anything, and to ensure that no malware on my system
>> (I try to keep it malware-free, obviously, but I also know that just
>> because I don't think I've been hacked doesn't mean I haven't been)
>> modifies a local copy I make.
>
> Ah, OK. Well, if signing PDF documents doesn't interfere with viewing them
> on non-Adobe software then I'm willing to have us consider doing it. Could
> you or someone else send me a sample signed PDF document via email? Since
> I'm running a Mac with VMware Fusion I can check it out on a variety of
> platforms with different PDF readers.
>
> Frank
>
> --
> Frank Hecker
> hec...@mozillafoundation.org
> _______________________________________________
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to