On Wed, Dec 24, 2008 at 4:25 AM, Ian G <i...@iang.org> wrote:
> PS: on an earlier comment, check this out:
>
> http://blogs.technet.com/mmpc/archive/2008/11/06/malware-and-signed-code.aspx
>
> This is, IMHO, the sort of work that Mozilla should be treating as more
> important than today's case, because it evidences PRESENT danger.

"In most cases, CAs participating in the Microsoft Root Certificate
Program issue code signing certificates to a software publisher who
uses the certificate to sign malware. [...] In most cases, CAs
participating in the Microsoft Root certificate program are tricked
into issuing a valid certificate to the malware author."

Uhm... how is it "being tricked" to issue a code signing certificate
to a malware author, if the malware author proves his bona fides, and
it's issued in the name of the malware author?

-Kyle H
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to