In order to avoid repeating, I would refer you to my previous posts where I have answered all your questions.
I think you have to understand
1)how DV SSL issuance works
2)what does it take to improve standards on DV certs.. (one CA stopping issuance will not stop the others from issuing)
3)why is browser's allowing CA rootkeys that issues DV certs in their browsers.
4)What standards exist for issuing SSL certificates (yellow padlock)
5)Why should verisign or godaddy (biggest issuers of DV) stop issuing DV certs just because Comodo stopped
6)If Comodo should stop issuing DV certs, where would customers go and would they be better educated about the pitfalls of DV thru other vendors? (you need to check www.positivessl.com as to see how Comodo sells DV and how Comodo explains about DV)
So that you can fully appreciate what we are doing.
Melih
Sorry, all that is too technical for me. When I first posted in this thread, I did it as a concerned user of the Internet. I browse daily and for a few hours a day, with breaks.
I find it quite worrying that malware creators can go ahead and get certificates for their malware domains, and most people won't even be aware of what is hitting them.
Instead of asking me to tell the browsers people to do whatever you think they should, go ahead and explain them your view.
But, from the view of a casual user like myself, I don't understand and can't believe how easy is for malware folks to have legitimate (as in people believing is a legitimate domain) ways of causing harm to people, just because no one cares enough to whom and for what those certificates are meant.
5)Why should verisign or godaddy (biggest issuers of DV) stop issuing DV certs just because Comodo stopped
So, just because others make it easy for people with bad intentions to get certificates, COMODO does the same? Maybe if one takes the lead, others would follow? Maybe not.. I have no idea. I guess this is all a business by the end of the day.
6)If Comodo should stop issuing DV certs, where would customers go and would they be better educated about the pitfalls of DV thru other vendors? (you need to check www.positivessl.com as to see how Comodo sells DV and how Comodo explains about DV)
You talk if COMODO should stop issuing DV certificates... I never talked that... Nor for COMODO or any other CA.
There's a fine line between that and have background information to whom the DV certificate goes to. Because for what I understand, there's no background information of what so ever. Anybody can get one, no matter what that domain is for.
Does it (
www.positivessl.com) explain how easy is for people with bad intentions to get them?
Anyway, just as I mentioned previously, certificates mean nothing at all, if anyone can get them for whatever purpose. Having a certificate doesn't mean a domain is safe (as in with good intentions), at all.
Well, over and out. I've had enough.
Thanks for your explanations.