A few amusing (lies, damned lies, and) statistics...

Small business accounts for slightly more than 50% of the US gross
domestic product (source:
http://www.smallbusinessnotes.com/aboutsb/rs299.html).  There were, in
2005 (latest year for which statistics are available), 6 million small
employers (fewer than 500 employees) and 17.5 thousand large employers
(500+ employees) in the United States (source:
http://www.sba.gov/advo/research/profiles/08us.pdf)

I hope I don't have to point out the business merits of targeting
something other than the 17.5k big fish with something more
affordable.  And that includes all of the nonprofits which don't have
the budget for EV certification, but which need more than a domain
validated certificate to be able to call attention to the fact that
they are legitimate organizations.

I do need to point out that because there's no differentiation in the
user interface between identity-validated certificates, many
businesses are opting for domain-validated certificates as a
cost-cutting measure, and using them to secure e-commerce sites.

And since EV targets essentially only the 17.5 thousand, it's not a
stretch to realize that Mozilla (and the CA/B Forum) are putting a
huge UI, technical, and marketing effort to ask the 17.5k large
companies to pay more in order to protect their customers against
phishing on... less than half of a percent of businesses.

Phishing is by no means the only kind of fraud out there.  Domains
which have servers which are not secure pose a much bigger risk of
fraud than the relatively tiny number of sites which are fat targets
for phishers.

Certificates cannot prevent fraud.  They do not and cannot state
anything at all about a given entity's business model (which can, and
often does, change at the speed of thought).  All they can do is
identify who was supposed to have had control of the private key for
the public key which was certified.

-Kyle H

On Thu, Jan 1, 2009 at 7:39 PM, Eddy Nigg <eddy_n...@startcom.org> wrote:
> On 01/02/2009 04:38 AM, Kyle Hamilton:
>>
>>  From what I can see, the general overall idea that Eddy is suggesting
>> seems to be:
>>
>> Type 1: the person requesting the certificate has shown that they have
>> some means of accessing things either in their mailbox or in the
>> URI-space of the domain.  (DV)
>> Type 2: (currently nonexistent) non-EV-eligible entities, businesses
>> which don't present a large enough attack surface to create a large
>> economic impact were their site MITM-attacked, has provided and shown
>> legal paperwork which backs up their assertions such that the CA is
>> willing to certify their identity in the Subject field (essentially
>> the initial requirements of Verisign/Thawte et al)
>> Type 3: extended verification of identity and legal existence, all
>> documents checked against their original sources, etc (EV)
>>
>> (These are NOT to be confused with "Class N" as currently used by
>> Verisign et al.)
>>
>> Is this correct?  Or am I misunderstanding?
>>
>
> This is more or less correct. It's the middle ground which isn't covered
> very well. It's what anything above webmail, forums and blogs, but less than
> what is called "high profile brand". A small part time shop selling some
> widgets are a good fit for this Class. Those are many times individuals or
> small businesses.
>
> (BTW, the small businesses make up still an important part of the economy
> usually)
>
>
> --
> Regards
>
> Signer: Eddy Nigg, StartCom Ltd.
> Jabber: start...@startcom.org
> Blog:   https://blog.startcom.org
> _______________________________________________
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to