Some useful utilities in light of Harper's new Internet Surveillance Law:
HTTPS Everywhere (Firefox): http://www.eff.org/https-everywhere
KB SSL Enforcer (Chrome): https://chrome.google.com/webstore/detail/flcpelgcagfhfoegekianiofphddckof
My Internet Privacy Platform: https://www.pirateparty.ca/forum/index.php?topic=898.0
We need to make certs free (provided by a crown corporation) and deprecate HTTP in favour of HTTPS with AES/TLS.
https://www.eff.org/pages/how-deploy-https-correctly
Posts
https://secure.wikimedia.org/wikipedia/en/wiki/CAcert.org
Maybe the issue is if you use https on your site make it all https? I'm interested in seeing more comments.
Also, on the issue of internet privacy, don't you think it should be a law that you are given easy access to shut down your account and have all your account information removed within a certain amount of days and your information is not allowed to be transfered or sold to another party during this period.
I agree with everything, especially the mandatory forum data rotation.
But one step at a time.
https://www.startssl.com/?app=40
The proposed amendments only allow for the collection transmission data, not content. Regarding the collection of information through preservation demand (without a court order), from what I have read, it can only be held for three months before being destroyed unless a warrant has been successfully obtained. They don't get to have a peek at what is in there beforehand.
The bigger issue relates to security tools that have legitimate uses which would become illegal to import or have in your possession. At the extreme, we would no longer be able to obtain or use password recovery tools, hacking tools for intrusion testing, or the like. In reality, it remains to be seen how it will play out.
For those interested, the full bill is available here. Compare it to the current criminal code to get a better idea of how it will look once it passes.
edit: I don't really want to be negative about this, but the idea of deprecating http is mostly a waste of time. In the end it is only going to dilute the current usefulness of https. If you look at the long version of c-52, isp are required to provide non encrypted endpoint content if the information collected turns out to be encrypted. I followed the reddit thread (I don't post there), and there seems to be a high number that haven't even read the proposed bills.
http://arstechnica.com/civis/viewtopic.php?p=21646755#p21646755
http://www.reddit.com/r/canada/comments/hanjx/some_useful_utilities_in_light_of_harpers_new/c1u4jdn
=====
Seems like SSL/TLS is rather unsuitable for universal encryption due to the centralization of the CAs and the problem of duplicate and fake certs.
Perhaps we could replace SSL/TLS with OpenPGP combined with DNSSEC. Out of curiosity, what would the drawbacks of replacing SSL/TLS with OpenPGP combined with DNSSEC be?
http://en.wikipedia.org/wiki/Transport_Layer_Security
http://en.wikipedia.org/wiki/Pretty_Good_Privacy
http://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions
Note: We should still use utilities like HTTPS Everywhere as any encryption is better than no encryption. However, we need to look to the future and form a plan to replace TLS/SSL as it is not suitable for universal web encryption.
https://www.eff.org/https-everywhere
Standard practice is to walk the chain of signatures up to the root and check if the root is in the trusted list
PGP checks if any trusted 3rd parties in your "web of trust" vouch for it
The problem with a website is that unless you happen to have someone who has vouched for that particular site in your web (or I suppose a chain of people who have), you can't actually verify the cert.
PGP puts the onus on the individual user to make sure the keys he accepts are actually valid. The fundamental problem in this scheme is that you cannot buy a new computer, turn it on, go to httpgp://your.bank.com and actually be able to trust the security at all, unless you include a list of people with "signing authority" and then you've just recreated the current situation.
I just think the identification and encryption parts of TLS/SSL need to be decoupled.
And there are keyservers for OpenPGP that can be used to verify the keys. I know because I had to use them when I was making packages for my Linux distro.
Those keyservers are simply the "CAs" for those distros, how is that any different?
The basic process (if I'm remembering correctly and ignoring algorithm negotiation) is
Server sends cert and cert_signature
Client checks that the CA is trusted the certificate matches what it expects and that H(cert) == E(capublic, cert_signature) (slightly more complicated for certs not signed by the root CA)
Client generates symmetric key K and sends M = E(certpublic, K)
Server gets K = E(certprivate, M)