On 6/4/09 12:27, Gervase Markham wrote:
On 04/04/09 22:26, Florian Weimer wrote:
(IMHO, the answer to the homograph issue is to give users better
indicators and tools to see what's going on.

I don't agree; that's pushing security decisions down to the user, which
is OK for 0.1% but bad for 99.9%, because they are not qualified, and do
not have the time, energy or inclination to become qualified, to learn
about the problem and make the decision.


That's OK as long as we are clear that Mozilla disclaims liability.

This is the "Know your Risks" thread where it is clear(er) that Mozilla doesn't take any liability for use of certs.

Given that there is now less & low liability kick-back to Mozilla, it is probably OK for Mozilla to make decisions about how to organise user security. Including hiding the classical PKI security model from them, for usability reasons. (Some would say that we should only make decisions like that if we take on liability ... but this is an open source org, with no financial relationship that would drive a liability calculation. So zero liability is the only sustainable choice.)

As now that we are moving to a unified zero-liability position across the security model (and Mozilla's risk is addressed) we could possibly go to the next step, which is improving the delivered security as opposed to the paper security.



iang

_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to