From fc07be049bac766faeace3f0285e4034c02c1ee0 Mon Sep 17 00:00:00 2001 From: Bob Mottram Date: Sun, 9 Nov 2014 18:25:45 +0000 Subject: [PATCH] Company pledges --- faq.org | 3 +++ website/faq.html | 14 +++++++++++++- 2 files changed, 16 insertions(+), 1 deletion(-) diff --git a/faq.org b/faq.org index 339df8d3..1c38ec30 100644 --- a/faq.org +++ b/faq.org @@ -16,6 +16,7 @@ | [[How do I get a domain name?]] | | [[How do I get a "real" SSL certificate?]] | | [[Why use self-signed certificates?]] | +| [[Why not use the services of $company instead? They took the Seppuku pledge]] | #+END_CENTER * Why not supply a disk image download? @@ -182,3 +183,5 @@ Almost everywhere on the web you will read that self-signed certificates are wor Security of web sites on the internet is still a somewhat unsolved problem, and what we have now is a less than ideal but /good enough to fool most of the people most of the time/ kind of arrangement. Long term a better solution might be to have a number of certificate authorities in a number of different jurisdictions vote on whether a given certificate actually belongs to a given domain name. Experimental systems like this exist, but they're not widely used. Since the current certificate system has an enormous amount of inertia behind it change could be slow in arriving. For now a self-signed certificate will probably in most cases protect your communications from "bulk" passive surveillance. Once you've got past the scary browser warning and accepted the certificate under most conditions (except when starting up the Tor browser) you should not repeatedly see that warning. If you do then someone may be trying to meddle with your connection to the server. You can also take a note of the fingerprint of the certificate and verify that if you are especially concerned. If the fingerprint remains the same then you're probably ok. +* Why not use the services of $company instead? They took the Seppuku pledge +[[http://seppuku.cryptostorm.org][That pledge]] is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "/on our side/". Post-[[https://en.wikipedia.org/wiki/Nymwars][nymwars]] and post-[[https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29][PRISM]] we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere. diff --git a/website/faq.html b/website/faq.html index bdd42850..6c8e2121 100644 --- a/website/faq.html +++ b/website/faq.html @@ -4,7 +4,7 @@ - + @@ -187,6 +187,10 @@ for the JavaScript code in this tag. Why use self-signed certificates? + + +Why not use the services of $company instead? They took the Seppuku pledge + @@ -475,6 +479,14 @@ For now a self-signed certificate will probably in most cases protect your commu

+
+

Why not use the services of $company instead? They took the Seppuku pledge

+
+

+That pledge is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "on our side". Post-nymwars and post-PRISM we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere. +

+
+