Douglas_Knight comments on Open thread, Feb. 9 - Feb. 15, 2015 - Less Wrong Discussion
You are viewing a comment permalink. View the original post to see all comments and the full post content.
You are viewing a comment permalink. View the original post to see all comments and the full post content.
Comments (321)
But it's dead-simple and robust compared to some sort of in-browser extension which saves the rendered DOM in the background.
I've never needed to prove that. My concern is usually having a copy at all, and the IA is trusted enough that it's a de facto proof.
But it's possible:
If anyone doubts you, they can take the relevant tarball, verify the hash and timestamp to when you say it was, then extract the relevant PCAP, verify the encryption, and then the displayed content.
Good luck.
Simply sniffing https packets is worthless. At most it tells you the length of the session. It's exactly the adversary that TLS is designed to foil. You need the session key to decrypt it, so, you need to hook into the TLS implementation.
It seems someone has done the TLS hooking: TLSNotary. Whitepaper:
Seems it requires an active and online auditor server (which is far from ideal), but if someone were to run such a trusted auditor, then you get your HTTPS provability and can timestamp it as before.
I think that the people who wrote the code are running a server.
I am surprised that it is possible for a browser plug-in to hook so deeply into the browser to accomplish this.
Or make your own CA, install that certificate in your browser and MITM the connection. Probably easier than changing your browser's code; can easily be done all on a single system.
Knew I forgot something.