<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Talk%3APinning_Cheat_Sheet</id>
		<title>Talk:Pinning Cheat Sheet - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Talk%3APinning_Cheat_Sheet"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Pinning_Cheat_Sheet&amp;action=history"/>
		<updated>2026-04-12T19:12:10Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Pinning_Cheat_Sheet&amp;diff=144281&amp;oldid=prev</id>
		<title>Jeffrey Walton: Formatting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Pinning_Cheat_Sheet&amp;diff=144281&amp;oldid=prev"/>
				<updated>2013-02-14T02:32:06Z</updated>
		
		<summary type="html">&lt;p&gt;Formatting&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 02:32, 14 February 2013&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l8&quot; &gt;Line 8:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Governments Engage in Interception&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Governments Engage in Interception&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** http://www.thetechherald.com/articles/Tunisian-government-harvesting-usernames-and-passwords/12429/&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** http://www.thetechherald.com/articles/Tunisian-government-harvesting-usernames-and-passwords/12429/&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Vendors Provide Interception Taps&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* &lt;/ins&gt;Vendors Provide Interception Taps&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** http://www.cisco.com/web/about/security/intelligence/LI-3GPP.html&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;** http://www.cisco.com/web/about/security/intelligence/LI-3GPP.html&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Governments Use Interception Taps&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Governments Use Interception Taps&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Jeffrey Walton</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Pinning_Cheat_Sheet&amp;diff=144280&amp;oldid=prev</id>
		<title>Jeffrey Walton: Created page with &quot;== Past Failures ==  This section is 'further reading' for those interested in surveying the landscape.  * Governments Want/Require Interception ** Certified Lies: Detecting a...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Pinning_Cheat_Sheet&amp;diff=144280&amp;oldid=prev"/>
				<updated>2013-02-14T02:31:20Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;== Past Failures ==  This section is &amp;#039;further reading&amp;#039; for those interested in surveying the landscape.  * Governments Want/Require Interception ** Certified Lies: Detecting a...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Past Failures ==&lt;br /&gt;
&lt;br /&gt;
This section is 'further reading' for those interested in surveying the landscape.&lt;br /&gt;
&lt;br /&gt;
* Governments Want/Require Interception&lt;br /&gt;
** Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL, cryptome.org/ssl-mitm.pdf&lt;br /&gt;
** http://www.dailymail.co.uk/indiahome/indianews/article-2126277/No-secrets-Blackberry-Security-services-intercept-data-government-gets-way-messenger-service.html&lt;br /&gt;
* Governments Engage in Interception&lt;br /&gt;
** http://www.thetechherald.com/articles/Tunisian-government-harvesting-usernames-and-passwords/12429/&lt;br /&gt;
Vendors Provide Interception Taps&lt;br /&gt;
** http://www.cisco.com/web/about/security/intelligence/LI-3GPP.html&lt;br /&gt;
* Governments Use Interception Taps&lt;br /&gt;
** https://www.eff.org/nsa-spying&lt;br /&gt;
* Mobile Interception is Patented&lt;br /&gt;
** Lawful interception for targets in a proxy mobile internet protocol network, http://www.google.com/patents/EP2332309A1&lt;br /&gt;
* Handset manufactures add trusted roots&lt;br /&gt;
** http://gaurangkp.wordpress.com/tag/nokias-man-in-the-middle-attack/&lt;br /&gt;
* Carriers can add trusted roots&lt;br /&gt;
** No reference yet, but http://www.theregister.co.uk/2011/12/15/carrier_iq_privacy_latest/&lt;br /&gt;
* CAs can become compromised&lt;br /&gt;
** http://isc.sans.edu/diary.html?storyid=11500&lt;br /&gt;
* Researchers can create Rogue CAs&lt;br /&gt;
** http://www.win.tue.nl/hashclash/rogue-ca/&lt;br /&gt;
* DNS can become compromised&lt;br /&gt;
** http://forums.theregister.co.uk/forum/2/2011/09/05/dns_hijack_service_updated/&lt;br /&gt;
* Physical plant can become compromised&lt;br /&gt;
** http://www.pcworld.com/article/119851/paris_hilton_victim_of_tmobiles_web_flaws.html&lt;br /&gt;
* Its easy to set up an AP or Base Station (Chris Paget's IMSI Catcher)&lt;br /&gt;
** http://www.wired.com/threatlevel/2010/07/intercepting-cell-phone-calls/&lt;br /&gt;
* Can't trust some CAs – they will sell you out and issue subordinate CAs for money&lt;br /&gt;
** http://www.net-security.org/secworld.php?id=12369&lt;br /&gt;
** http://www.zdnet.com/trustwave-sold-root-certificate-for-surveillance-3040095011/&lt;br /&gt;
* Can't trust some browsers – they will sell you out and elide their responsibility&lt;br /&gt;
** https://bugzilla.mozilla.org/show_bug.cgi?id=724929&lt;br /&gt;
* Can't trust some browsers – they include questionable certificates out of the box&lt;br /&gt;
** https://bugzilla.mozilla.org/show_bug.cgi?id=542689&lt;br /&gt;
* Can't override some browser's CA list&lt;br /&gt;
** http://my.opera.com/community/forums/topic.dml?id=1580452&lt;br /&gt;
* Can't override OS's CA list (burned into ROM)&lt;br /&gt;
** http://support.google.com/android/bin/answer.py?hl=en&amp;amp;answer=1649774&lt;br /&gt;
* CRL/OCSP does not work as expected/intended&lt;br /&gt;
** http://blog.spiderlabs.com/2011/04/certificate-revocation-behavior-in-modern-browsers.html&lt;br /&gt;
** https://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-browser-collusion&lt;br /&gt;
* User will break it too (not just bad guys)&lt;br /&gt;
** http://www.esecurityplanet.com/mobile-security/hacker-bypasses-apples-ios-in-app-purchases.html&lt;br /&gt;
** http://www.h-online.com/security/news/item/Apps-for-Windows-8-easily-hacked-1767839.html&lt;br /&gt;
* Interception proxies add additional risk&lt;br /&gt;
** http://blog.cryptographyengineering.com/2012/03/how-do-interception-proxies-fail.html&lt;br /&gt;
* HTTPS is broken&lt;br /&gt;
** http://www.thoughtcrime.org/software/sslstrip/&lt;br /&gt;
* PKI is broken&lt;br /&gt;
** www.cs.auckland.ac.nz/~pgut001/pubs/pkitutorial.pdf&lt;br /&gt;
* The Internet is Broken :)&lt;br /&gt;
** http://blog.cryptographyengineering.com/2012/02/how-to-fix-internet.html&lt;/div&gt;</summary>
		<author><name>Jeffrey Walton</name></author>	</entry>

	</feed>