Transport-level encryption with Tcpcrypt
Transport-level encryption with Tcpcrypt
Posted Aug 29, 2010 17:52 UTC (Sun) by foom (subscriber, #14868)In reply to: Transport-level encryption with Tcpcrypt by Tet
Parent article: Transport-level encryption with Tcpcrypt
The padlock is shown on the outermost site. It is up to that site to ensure the security of its own website against XSS, against hacking of its servers, and against using insecure content inappropriately. It's their responsibility, not yours, to make sure they use secure iframes not insecure ones. And your browser checks the certificate to make sure that it *actually* belongs to the site that your bank trusted. So no, you don't need to verify every iframe individually.
Okay, so it's not literally true that "the only other party to view your communications was the web site", it's the web site and other web sites that the web site trusts.
> It's trivially easy for a phishing site to show a valid padlock throughout the entire transaction.
Of course, but that has nothing to do with the rest of your complaint. In the case of a phising site, "the web site" that the user is visiting, and which is protected, is the phising site.
