<<< Date Index >>>     <<< Thread Index >>>

Re: New whitepaper "The Phishing Guide"



> Agreed but forcing phishers to generate key pairs, purchase
> certificates, and/or buy-off CA vendor personnel creates additional
> audit trails that could help in the tracking and prosecution of those
> individuals. Combine this with certificate revocation and you have at
> least a model that gives more verification, auditing, and remediation
> than currently exists in the pursuit of these criminals. It's at least a
> step in the right direction and shouldn't be avoided simply because it
> won't immediately stop all phishing attacks or protect all users.
>
> Watermarks do not stop all counterfeiting. Holograms do not stop all
> credit card fraud. It doesn't mean we shouldn't do what we can to help -
> even if its only a partial solution.

Phishing relies on the victim lacking the information or the intellectual
capability to distinguish genuine email or web page from a fake one. That is
why phishers attempt to use nearly-real URLs and shiny padlock icons so that
the user feels a false sense of security and correctness when he sends in
his social security number. If a phishing email is signed correctly, the
email client will display a padlock icon on its own plus assurances that the
email has been signed and valid and authenticated, etc. All this will
further the false sense of security that phishing relies on, unless the
email client is configured to explicitly display enough information on the
signature and enough warnings for the average user to be able to make an
informed decision.

Philip