[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Chinese root CA issues rogue/fake certificates
- Subject: Chinese root CA issues rogue/fake certificates
- From: lyndon at orthanc.ca (Lyndon Nerenberg)
- Date: Wed, 31 Aug 2016 18:49:17 -0700
- In-reply-to: <[email protected]>
- References: <CAB69EHjh+xLBzP+XoEUpo3fRYC_33aQWCEuDZPJc8MtxdshjQg@mail.gmail.com> <CA+E3k91eiwyykLV05fVL89Fd=USe-pzuhFRx4SFaCnuYMYskKA@mail.gmail.com> <CA+E3k923N8JRguG0yfjFg6ZkfhrUxc+CcxwD0Rh9kULgrCvr-Q@mail.gmail.com> <[email protected]>
> On Aug 31, 2016, at 6:36 PM, Matt Palmer <mpalmer at hezmatt.org> wrote:
>
> Thanks, Netscape. Great ecosystem you built.
Nobody at that time had a clue how this environment was going to scale, let alone what the wide-ranging security issues would be.
And where were you back then, not saving us from our erroneous path ...
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20160831/0a7481ce/attachment.pgp>