TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo
from: Rich
date: 2006-09-10 09:01:00
subject: Re: Code signing

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_11D6_01C6D4B7.A3326390
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   Not true.  And also another good example of how signing can be =
valuable.

Rich

  "Geo"  wrote in message
news:4503c7ea$2{at}w3.nls.net...
  The feature you mention only allows to always approve, not always =
deny. For an admin it would be nice to always deny specific trusts.
    "Rich"  wrote in message news:45019310$1{at}w3.nls.net...
       While there is a feature for a user or admin to trust a code =
signer so that no user confirmation occurs, I never mentioned it.  I =
would not recommend this for an individual user as there are so few =
occasions for prompt to justify.

       If you can't remember who you trust or even make a decision each =
time you have a problem that has nothing to do with computers.

    Rich

      "Geo"  wrote in message =
news:45014108{at}w3.nls.net...
      What happens when a vendor you trust does something like oh say =
loading the first half of WGA on your system without your approval? Is =
there a checkbox somewhere that says "never trust the bastards
again"?

      Kinda hard to remember who you trust and who you don't without a =
nice feature that helps keep track. The only thing the OS offers is to =
tell you who signed it. It doesn't allow you to mark them as untrusted.

      Geo.
        "Rich"  wrote in message news:4500ee78$1{at}w3.nls.net...
           No.  You look at the signing certificate to see if you trust =
both the signing party and the certification path.  If you do not, do = not
trust the signed entity.  If something is not signed, you don't have = even
this option.  How do you choose what to trust?

           The average Joe relies on the identity of the signing party =
alone and assumes that the certification authorities that are not =
distrusted have been vetted.

           In practice, have you ever known this to be a problem with =
signed code?  How much actual malware do you hear of that is signed?  I =
can't think of any that wasn't some PR stunt by someone that signed a =
demo which he released under his own name anyway.

        Rich


------=_NextPart_000_11D6_01C6D4B7.A3326390
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   Not
true.  And also =
another good=20
example of how signing can be valuable.
 
Rich
 
"Geo" <georger{at}nls.net>">mailto:georger{at}nls.net">georger{at}nls.net> wrote=20 in message news:4503c7ea$2{at}w3.nls.net... The feature you mention only allows = to always=20 approve, not always deny. For an admin it would be nice to always deny = specific trusts.
"Rich" <{at}> wrote in message news:45019310$1{at}w3.nls.net... While there is a = feature for a=20 user or admin to trust a code signer so that no user confirmation = occurs, I=20 never mentioned it. I would not recommend this for an = individual user=20 as there are so few occasions for prompt to justify. If you can't remember = who you=20 trust or even make a decision each time you have a problem that has = nothing=20 to do with computers. Rich
"Geo" <georger{at}nls.net>=20">mailto:georger{at}nls.net">georger{at}nls.net>=20 wrote in message news:45014108{at}w3.nls.net... What happens when a vendor you = trust does=20 something like oh say loading the first half of WGA on your = system=20 without your approval? Is there a checkbox somewhere that says = "never=20 trust the bastards again"? Kinda hard to remember who you = trust and who=20 you don't without a nice feature that helps keep track. The only = thing the=20 OS offers is to tell you who signed it. It doesn't allow you to = mark them=20 as untrusted. Geo.
"Rich" <{at}> wrote in message news:4500ee78$1{at}w3.nls.net... No. You look = at the=20 signing certificate to see if you trust both the signing party = and the=20 certification path. If you do not, do not trust the signed = entity. If something is not signed, you don't have even = this=20 option. How do you choose what to trust? The average Joe = relies on the=20 identity of the signing party alone and assumes that the = certification=20 authorities that are not distrusted have been = vetted. In practice, have = you ever=20 known this to be a problem with signed code? How much = actual=20 malware do you hear of that is signed? I can't think of = any that=20 wasn't some PR stunt by someone that signed a demo which he = released=20 under his own name anyway. Rich ------=_NextPart_000_11D6_01C6D4B7.A3326390-- --- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.