Hacker Newsnew | past | comments | ask | show | jobs | submit | elgaton's commentslogin

COMODO seems to be the only CA that still offers them: https://www.comodo.com/home/email-security/free-email-certif...


You might want to have a look at the OSDev wiki [1], which is definitely more comprehensive than those notes.

[1] http://wiki.osdev.org/Main_Page


This would be a great format to tackle the more advanced stuff that I have problems learning.

A wiki isn't the best format, at least for me.


Honestly the only good wiki I've ever seen is Wikipedia, and that's only because Google exists. Wikis suffer from the most ridiculous discoverability problems. Unless you can successfully guess a page's title, find it on Google, or the wiki has good searching (many don't), I find myself clicking around random pages to see where to start.

Especially when I am dumped into a random wiki for the first time. Starting off in Minecraft years ago, people said "read the wiki first!" with no link to the first page I should read, or any successive pages. Completely useless.

Maybe I'm missing a nice table of contents that every wiki secretly has hidden away, but tables of content exist for a reason. Discoverability.


I feel the same way.


Same feels there.


StartSSL [1] and COMODO [2] still offer them (of course, there's still the CA compromise issue you mentioned). Keep in mind, however, that a hierarchical, centralized trust model can still be useful (e.g. in medium-to-large organizations, where having an internal CA and delegating identity verification to a few knowledgeable employees is more practical than having everyone build a web of trust).

[1] https://www.startssl.com/

[2] https://www.comodo.com/home/email-security/free-email-certif...


> Keep in mind, however, that a hierarchical, centralized trust model can still be useful (e.g. in medium-to-large organizations, where having an internal CA and delegating identity verification to a few knowledgeable employees is more practical than having everyone build a web of trust).

Sure, but it's easy to build that kind of model on top of OpenPGP (just have an organizational signing key and tell everyone to trust that), whereas it's almost impossible to build a CA-independent model on top of SSL.


Encryption is also supported via a browser plugin, so it's not necessary to upload the private key to the server. Regarding your questions: 1) yes, you can revoke the key by generating a revocation certificate and publishing it on a public keyserver (of course, your correspondents would need to refresh the public key from the keyserver to know it was revoked, which is something they might not do); 2) sent and received messages from the past, unfortunately, are readable by the person who is in possession of the private key, if such key is not protected by a strong password; 3) yes, you still need the old private key to read the old messages; 4) you can generate a master key (to be kept strictly offline) and several, frequently rotating subkeys for encryption purposes. It's not a silver bullet solution (in the sense that a thief would still have access to all your subkeys, meaning he could read all your messages up to the point the keys are stolen, but it mitigates the damage somehow). See here: https://alexcabal.com/creating-the-perfect-gpg-keypair


COMODO still appears to offer a free e-mail certificate: https://www.comodo.com/home/email-security/free-email-certif...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: