Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Problem is, this assumes that all CAs and their resellers do that verification properly.

https://security.googleblog.com/2015/03/maintaining-digital-...

https://arstechnica.com/information-technology/2017/11/evasi...

"The third key weakness in the code-signing ecosystem was the failure of certificate authorities to verify the identities of people applying for code-signing certificates. Twenty-seven certificates in the group of 111 misappropriated certificates that the researchers identified fell into this class. Twenty-two of the certificates were improperly issued as a result of identity theft of a legitimate company. In some cases, malicious actors impersonated legitimate companies, in some cases ones that had no involvement at all in publishing software. In the remaining five cases, the certificates were issued to fraudulent shell companies. "



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: