[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] SIGAINT email service targeted by 70 bad exit nodes
On Wed, Apr 22, 2015 at 11:03 PM, <support@xxxxxxxxxxx> wrote:
> I know we could SSL sigaint.org, but if it is a state-actor they could just
> use one of their CAs and mill a key.
> ...
> P.S. My PGP key is here: http://sigaintevyh2rzvw.onion/pubkey.txt
Whether or not using a CA's cert, you should TLS wrap all your
services and sign fingerprints of everything on your own so that
those who care can pin down your TLS certs in their apps.
You can also cross sign your signing key with your onion key.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk