<div dir="ltr">the biggest advantage of VeriSign (or Thwate, for that matter) is that the browsers know them (their CA is noted as a trusted one in most browsers [or is it the OS?]), which prevent the visitor to get the unpleasant/scary message that 'the authority for this certificate is unknown' and force the user to manually accept the cert. i cannot testify to the strength of their encryption, or if it is better to create a CA on your server and sign the cert with it.<br>
<br>E<br><br><br><div class="gmail_quote">On Thu, Sep 3, 2009 at 3:02 PM, Rick Moen <span dir="ltr"><<a href="mailto:rick@linuxmafia.com">rick@linuxmafia.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div class="im">Quoting Darlene Wallach (<a href="mailto:freepalestin@dslextreme.com">freepalestin@dslextreme.com</a>):<br>
<br>
> As far as VeriSign goes, I know how to spell it since you wrote it<br>
> down for me. How secure are websites covered by VeriSign? How likely<br>
> is it someone can crack the site and get the confidential information<br>
> protected by VeriSign?<br>
<br>
</div>Um... VeriSign, in acting as an SSL Certificate Authority that signs<br>
customers' https SSL certificates, isn't making any statements<br>
whatsoever about security behind the scenes at the site. The SSL cert<br>
merely makes a kinda-sorta statement about whose SSL cert it is.<br>
Really, all that happens is that your Web browser doesn't pop up<br>
a warning about the cert, solely because it detects that the cert<br>
has been signed by a known CA (that's in the browser's list of CAs<br>
whose word it's willing to take).<br>
<br>
The site in question could easily have been taken over by the Russian<br>
Mafia, Colombian druglords, _and_ the Bavarian Illumnati, who severally<br>
and jointly have dug their hooks into the site's back-end databases,<br>
Web code, etc., and are using the firm's long-term capital assets as<br>
petty cash funds. The Verisign signature will still continue to<br>
validate on the site SSL cert.<br>
<div><div></div><div class="h5"><br>
<br>
<br>
_______________________________________________<br>
conspire mailing list<br>
<a href="mailto:conspire@linuxmafia.com">conspire@linuxmafia.com</a><br>
<a href="http://linuxmafia.com/mailman/listinfo/conspire" target="_blank">http://linuxmafia.com/mailman/listinfo/conspire</a><br>
</div></div></blockquote></div><br></div>