And further, you should have a client app on your computer for
dealing with
shared secrets, which is only capable of attempting a visa payment
with an
entity trusted by Visa.
On 2011-09-24 4:06 AM, John Levine wrote:
I don't see how to do that in a useful way without non-programmable
hardware. We've seen PC-based malware do pretty much any MITM attack
you can imagine.
Most PC malware succeeds in controlling an application [0]. These days,
more OS support attention is going into stopping a breached app from
allowing a hop. This is Android's sandboxing for example.
Hence, the current advice for phishing is "use another browser," as an
analagous situation.
So, people use Firefox for their general work, and reserve Safari for
online banking, only [1]. I have actually succeeded in teaching this to
my mother, who at 70 or so is quite incapable of dealing with computers
at any geek level, but she does follow a script written out on 4 pages
to review her bank account. What's more, she has succeeded in teaching
the grandchildren that they can use her laptop but they are banned from
using Safari.
On 24/09/11 11:45 AM, James A. Donald wrote:
Most computers are not controlled by malware, and the malware argument
is as much an argument against existing ssl/https/pki as it is against
any alternative to ssl/https/pki
Right, exactly! It's pretty easy to counter any argument by throwing in
some theoretical grenade.
"But wait, all trusted hardware is controlled by the state who
perverts the chip makers...."
"But wait, China manufactures all the chips now, so our state is
perverted by their state..."
"but wait..."
Experimentation cuts this Gordian Knot. In this sense, the google CA
pinning hack is just what the doctor ordered. That technique was
obviously easily destroyed in argumentation by any number of theoretical
grenades. But, code rebuilds what committees destroy.
Which points to a further problem. As the lifecycle of a crypto system
matures, the security apparatus takes on a less fluid form. In the
extreme, as all security decisions require approval from external
committees [2], the security model becomes concrete, allowing attackers
to easily walk around it, on top of it, or through it where the door was
nicely left.
The way to understand why this doesn't work is to look up OODA loops.
The consequences of this will destroy a number of myths about security
and the Internet...
iang
[0] Dealing with phishing is all about risks, not about theoretical
binary security thinking. For most part that's because the vendors have
really not dealt with it, so the users have increased risks, and have
had to learn to deal with it using ad hoc methods.
[1] Or, IE, v.v. I've taken to using Chrome a lot lately but only for a
specific purpose. It's great for gmail, but horribly sugary for
news.google.com. I don't know how anyone can put up with that sort of
casino look.
[3] The specific construction in concrete here is that browser vendors
look to PKIX for security guidance, and the latter focus on arcane bugs
in SSL which have never been exploited in the wild, but really tease the
cryptominds in the committees. So, the blind leading the blind.
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography