New standard for privacy control. (Was: Stripping code with Privoxy)

herfel at gmx.net herfel at gmx.net
Sun Mar 11 09:40:45 UTC 2007


-------- Original-Nachricht --------
Datum: Sat, 10 Mar 2007 09:35:19 -0800
Von: "Michael_google gmail_Gersten" <keybounce at gmail.com>
An: or-talk at freehaven.net
CC: 
Betreff: New standard for privacy control. (Was: Stripping code with Privoxy)

> Here's a better idea.
> 
> Why do we make the assumption that a browser can trust everything it is
> given?
> 
> That's a serious question. Why do browsers not have an external
> verification plug in?
> 
> Lets say we wanted to design such a browser extension. 

You haven't specififed the threat(s) you are trying to protect against. You should never try to build a solution without a clear description of the problem.

To prevent other people from tampering with data on a remote connection there is ssl. To prevent MITM Attacks there is ssl. If you do not trust the server, and want to be sure that a document is from a certain person, there is GPG, S/Mime etc.

> So lets say we wanted to design such a standard.

It looks like you might be trying to reinvent the wheel, when you talk about defining a standard...

However integrating the possibilities of gpg into browsers would be a nice thing, but given that this thread started on the topic of injecting (mailicious) code into webpages, that's probably n entirely different threat model you have in mind.

And of course, let's not kid ourselves - the majority of users are overwhelmed/uninformed about how to make proper use of ssl (What are CAs? How do I verify a certificates? How to react to what kind of warnings?), so it's unlikely that something more complex that works on a document basis, or fragments of documents is going to be more successful in actually reaching its goals (i.e. appropiate use rather than just wide adoption with uninformed/dangerous use).


herfel
-- 
"Feel free" - 10 GB Mailbox, 100 FreeSMS/Monat ...
Jetzt GMX TopMail testen: www.gmx.net/de/go/mailfooter/topmail-out



More information about the tor-talk mailing list