> But that would no longer be about HTTP. At least as far as the things
> we've been talking about exposing in browsers are concerned.

Lots of things speak over http that arent (permenently) connected to the
global web / dns, why is that not of any concern?

On 21 November 2014 16:09, Anne van Kesteren <ann...@annevk.nl> wrote:

> On Fri, Nov 21, 2014 at 3:53 PM, Patrick McManus <mcma...@ducksong.com>
> wrote:
> > nosslsearch.google.com is an example of the weight of regulatory
> compliance
> > in action. Google talks loudly about all https (and has the leading track
> > record), yet there it is. And google isn't special in that regard.
>
> Why would they be allowed to use OE?
>
>
> >> I.e. Let's Encrypt going away somehow?
> >
> > More generally being dependent on a CA is an additional third party
> > operational risk when comparing http:// vs https://.. you're already
> > dependent on your DNS provider and an ISP and now your fate is also
> linked
> > to the CA that signed your cert too. e.g. at the most basic level not
> > revoking it on you - but also not doing something dumb unrelated to you
> > that gets the signing cert your CA used tossed out of UAs (again).
>
> That risks seems tiny compared to the risk of having an end user
> man-in-the-middled.
>
>
> >>> non-access to webpki.
> >>
> >> Does this mean intranets?
> >
> > mostly.. but more generally things that don't bind well to the global dns
> > that the webpki relies on.. so potentially peer to peer and mesh
> > interactions too..
>
> But that would no longer be about HTTP. At least as far as the things
> we've been talking about exposing in browsers are concerned.
>
>
> --
> https://annevankesteren.nl/
> _______________________________________________
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to