[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Chinese root CA issues rogue/fake certificates
- Subject: Chinese root CA issues rogue/fake certificates
- From: mpalmer at hezmatt.org (Matt Palmer)
- Date: Thu, 1 Sep 2016 20:12:07 +1000
- In-reply-to: <[email protected]>
- References: <CAB69EHjh+xLBzP+XoEUpo3fRYC_33aQWCEuDZPJc8MtxdshjQg@mail.gmail.com> <CA+E3k91eiwyykLV05fVL89Fd=USe-pzuhFRx4SFaCnuYMYskKA@mail.gmail.com> <CA+E3k923N8JRguG0yfjFg6ZkfhrUxc+CcxwD0Rh9kULgrCvr-Q@mail.gmail.com> <[email protected]> <[email protected]>
On Wed, Aug 31, 2016 at 06:49:17PM -0700, Lyndon Nerenberg wrote:
> > On Aug 31, 2016, at 6:36 PM, Matt Palmer <mpalmer at hezmatt.org> wrote:
> >
> > Thanks, Netscape. Great ecosystem you built.
>
> Nobody at that time had a clue how this environment was going to scale,
> let alone what the wide-ranging security issues would be.
Nor did they particularly trouble themselves to find out.
> And where were you back then, not saving us from our erroneous path ...
You're going to go with that one, are you? Good for you.
- Matt
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 811 bytes
Desc: Digital signature
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20160901/4a78cc35/attachment.pgp>