Certificate authorities also can forge certificates and issue
certificates in fake names if asked by government agencies.  S/MIME is
too much under central control by design to be a sensible choice for
general individual use.

The central control is doubtless primarily motivated by the hopes of
turning a profit selling certificates to allow people to exchange
secure email etc.

OpenPGP's WoT provides a superset of S/MIME's hierarchically
controlled answer to identification and trust -- you can still have
CAs with OpenPGP, plus you can cross check and peer-to-peer certify
people you wish to interact with and so not need to trust some
untrustworthy and generally incompetent organisation.  (Verisign for
example issued someone a microsoft code signing cert).

Adam

On Thu, May 23, 2002 at 09:46:34AM -0700, Curt Smith wrote:
> Although I also hope for widespread e-mail encryption, I feel
> that S/MIME introduces more problems than it resolves.
> 
> Certificate Authorities issue certificates complete with CA
> imposed expiration dates and usage limitations.
> (I prefer independent systems with unrestricted certificates)
> 
> Certificate Authorities match individuals to keys
> (Thanks, but no thanks)
> 
> Certificate Authorities can revoke certificates at anytime
> (CA-driven DOS attack)
> 
> These are in addition to compatibility and security issues.

Reply via email to