Re: Adding Security Considerations regarding interception to p1

I don't like the proposed text at all. It proposes TLS as sole and
efficient means to protect privacy. That's wrong for different reason:
- TLS does not help against collecting and analyzing connection
 data, which is an important and dangerous part of the actions of
 governmental surveillance organizations.
- TLS does not help against data collection conducted by providers of
 internet services, which is an equal important threat to end user's
 privacy.
- The text only considers passive interception and man in the middle
 attacks and claims that TLS can mitigate the danger. It does not deal
 with MITM attacks on TLS-traffic which is known to happen. It ignores
 that TLS (at the moment) completely depends on the trustworthiness of
 CAs. But there is nobody who could tell for sure that these CAs are
 trustworthy. Quite the contrary. We have learned recently that even
 big companies seem to be quite defenseless when governments request
 their users data.
- It only comes up with proposals what servers should do. But it would
 be even more important to talk about what end users can do and what
 vendors of HTTP-clients should do to help end users in this (and
 what most browser vendors don't).
Discussion of security threats and measures against them is important.
But it should be done seriously. Ritually promoting the
one-size-fits-none security of TLS does not help.
Werner 

Received on Wednesday, 18 September 2013 18:24:49 UTC

AltStyle によって変換されたページ (->オリジナル) /