Tyil is a user on mastodon.social. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here.

I /really/ need to add n-gate.com to my rss reader because it’s *so good*. This is the best description I’ve ever seen of the Microsoft acquisition of Github.

@tyil ain’t no point in setting up https for a static site with no exchange of information. Literally who cares.

Tyil @tyil

@wxcafe HTML is information, and the purpose of HTTP is to exchange it.

Anyone intercepting the connection at any point can still inject stuff (like scripts), even if the original host only provides static content. And anyone can still read out the entire message and use it for personal/meta data harvesting.

Anyone understanding what the words "information", "exchange" and "security" mean would care.

· Web · 0 · 0

@wxcafe @tyil so friendly.. I think he has a good point: Setting up TLS certificates is super easy these days.

After all it is the authors decision not to do it. Can not really blame someone for that. If he doesn't know better: educate him.

If you really cared for "security" in that context you should try to get a cert fingerprint in-person from the author/admin. The certificate authority system is broken anyway...

@andi @tyil look, I know. I have TLS everywhere. I used to have self-signed certs everywhere before LE came along. I have a yubikey to store my gpg key. I do totp 2fa on ssh logins. I get crypto. But I also get that some things are not worth tls-ing, and that who the fuck gives a shit. It’s literally not a problem for anyone. It’lol be flagged as insecure by browsers soon and they’ll probably upgrade then. It’s fine, calm down, stop telling strangers on the internet.

@tyil @andi @wxcafe And when we have a browser-supported encryption scheme that doesn't use the CA system, I'll happily join the "encrypt everything" bandwagon.

@tyil @wxcafe I mean, I agree that not using TLS is just kinda lazy now, but if I had the capability to pull off the cleartext packet injection attack you're describing literally what prevents me from just rerouting your next DNS request to a fallback insecure host of my own for more pwnage?

@nickfarr @tyil look don’t try, this person clearly grasps basic concepts of “information”, “exchange” and “security” better than we do, we can’t compare

@wxcafe @tyil LOL, I'm not even considered "technical" by most of our mutual friends.

@tyil @wxcafe And herein lies the crux: cost/benefit.

Just as there's no magic bullet for security, nor should anything be assumed as default secure, one can't be dogmatic in telling a total strangers what their threat model or cost/benefit is.

I've seen lots of people introduce new security holes trying to make TLS work in their environment. LE made it soooo much easier, but in shared environments (i.e. most hosting), TLS is still non-trivial.

@jasper @wxcafe While absolutely true...how likely is it that the resolver doesn't support it and the domain is unsigned? Probably pretty good.