▲ | edent 2 days ago | |
It's really hard to say whether something like that is impossible. I'm not aware of, for example, Google's private signing keys for Android being leaked. Sure, plenty of CAs have been breached - but not all. That suggests it is possible to key these keys secure. | ||
▲ | analog31 2 days ago | parent | next [-] | |
That's fair. But it turns "possible" into a statement about a company's or government's expected degree of restraint, rather than a mathematical statement about the robustness of an encryption scheme. The famous case is what happened to government birth records when the Netherlands were overrun by Germany in WWII. They weren't even encrypted, but mere transfer of access led to tragedy. | ||
▲ | wizzwizz4 2 days ago | parent | prev | next [-] | |
Why would someone want to breach Google's private signing keys? It's easy enough to get malware signed just by submitting it through their ordinary processes. A better analogy would be the keys used by Microsoft to secure Outlook inboxes. | ||
▲ | palata 2 days ago | parent | prev [-] | |
> Sure, plenty of CAs have been breached - but not all. That suggests it is possible to key these keys secure. "Sure, plenty of people lose at the casino - but not all. That suggests it is possible to find a winning strategy." |