Closed noloader closed 8 years ago
@noloader Secure Contexts scope can't cover phishing in the way you have described in the same way that a compromised machine would also have the ability to cause the same level of damage.
The request here seems like a duplicate of #13, just stated in a different fashion. Again, if the user agent decides to trust a given certificate, then it considers the connection secure. That's the bar that this specification sets. You're correct that threats exist that involve compromise of the local machine. I don't believe this spec can or should attempt to address them.
Let's continue the conversation on #13. :)
The latest editor's draft (11 December 2015) of Secure Contexts states the following:
We _know_ the number one threat to users is phishing, but the model appears to be missing a treatment on the subject.
In this case, the particular threat is the user is asked or tricked into installing a CA certificate and the certificate is later used to intercept traffic. The user could comply in a number of scenarios. The scenarios include:
In the first case, an unwitting user at an airport, wifi hotspot or hotel may install it. In the second case, and organization or IT administrator may install it.