An anonymous reader writes “Recent reports from around the net suggest that SSL certificate chain for gmail has either changed this week, or has been widely compromised. Even less-than-obvious places to look for information, such as Google’s Online Security Blog, are silent. The problem isn’t specific to gmail, of course, which leads me to ask: What is the canonically-accepted out-of-band means by which a new SSL certificate’s fingerprint may be communicated and/or verified by end users?”… An anonymous reader writes “Recent reports from around the net suggest that SSL certificate chain for gmail has either changed this week, or has been widely compromised. Even less-than-obvious places to look for information, such as Google’s Online Security Blog, are silent. The problem isn’t specific to gmail, of course, which leads me to ask: What is the canonically-accepted out-of-band means by which a new SSL certificate’s fingerprint may be communicated and/or verified by end users?”

Read more of this story at Slashdot.






Read more http://rss.slashdot.org/~r/Slashdot/slashdot/~3/ElNnRuzfXzs/story01.htm