This ticket is to map all the existing VLC mirrors that already support HTTPS in order to have a detailed and precise view on how much of them can starts serving VLC related files over a secure channel since tomorrow.
Once that mapping has been done, it's useful to analyse those mirrors for how much (in % percentage) of the total download traffic account, because if those represent =>80% of download traffic, it would maybe reasonable to think to cut the remaining 20% unless they enable HTTPS within few months.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
@JB do you see the technical analysis that benefit end-users?
Those certificates of those hosts are valid, recognised by Chrome and those download links, if accessed/clicked from a new videolan.org upgraded with HTTPS-default, cannot be attacked with a MITM.
That's not trolling, it's just a technical security analysis that for some kind of reasons you are not willing to accept.
I'm very worried that you don't want to acknowledge the security and trust model behind that, it's science, not an opinions.
@JB do you see the technical analysis that benefit end-users?
Those certificates of those hosts are valid, recognised by Chrome and those download links, if accessed/clicked from a new videolan.org upgraded with HTTPS-default, cannot be attacked with a MITM.
That's not trolling, it's just a technical security analysis that for some kind of reasons you are not willing to accept.
I'm very worried that you don't want to acknowledge the security and trust model behind that, it's science, not an opinions.
Security of the HTTPS delivery of the binaries cannot be done unless you control all the servers.
Also, we cannot trust the CA model more than our GPG signature.
Our binaries are Windows Authenticode signed (similar on Android, iOS and macOS) and this works whatever the medium of download, be it HTTP, HTTPS, FTP or even USB key...
@JB hemmmm but you are trolling me or you really are not understanding what we are speaking about?
The normal scenario is as follow:
End users goes to videolan.org, and that's the root of trust because it's the brand advertised, will then follow a series of links by clicking around your website.
If all the links are in HTTPS and are using a valid certificate (also if not controlled by you), a third party will not be able to mount a MITM attack.
That's a point, full stop, don't deny this by speaking about Authenticode that have really nothing to do with what we are speaking about, because when a MITM attack happen, your signed binary will not even be downloaded by the end-user that's convinced to be speaking to videolan.org but instead is speaking to a nasty MITM attacking them.
Then, separately, if you have a branding problem because someone stole your name and use HTTPS to increase their outreach on search engine https://mainehost.com/google-starts-giving-ranking-boost-secure-httpsssl-sites/ but that's a very different problem, you are in low-ranking compared to a fake website because they are using HTTPS (and google boost them) but you are not using it.
End users goes to videolan.org, and that's the root of trust because it's the brand advertised, will then follow a series of links by clicking around your website.
End users goes to google, and types "vlc" and gets the 20 fake VLC website that buy adwords and other ads. Then gets virus.
If all the links are in HTTPS and are using a valid certificate (also if not controlled by you), a third party will not be able to mount a MITM attack.
So you prefer to trust the tons of HTTPS and CA certificates compared to OUR signature?
Then, separately, if you have a branding problem because someone stole your name and use HTTPS to increase their outreach on search engine https://mainehost.com/google-starts-giving-ranking-boost-secure-httpsssl-sites/ but that's a very different problem, you are in low-ranking compared to a fake website because they are using HTTPS (and google boost them) but you are not using it.
OK, you go too far. Please don't use VLC and please go away with your hatred. We don't want people insulting our work like you around us.
@JB You may re-read this tomorrow morning with a cup of coffee and discover that I never insulted you, but tried to help.
But if you do not wish to acknowledge the reality (including google boosting the ranking of HTTPS website faking your HTTP-only one), I cannot help you other than explaining and giving you external reference to read to understand.
@JB you may look forward for any of my messages on the various post and highlight a single insult to you. You will not find it.
What's happening, that's creating a lot of worry, is the approach to denying what's technically correct from a security standpoint of view.
Obviously this drive anyone crazy, because denying the technically correctness of an analysis by posing out of topic arguments only spike a spike of discussion (me against you and so on).
I'm dedicating a certain amount of time doing technical analysis, suggestions and engaging in conversation not because I have a lot of time to waste, but because I sincerely think that there's a very important room for improvement that shall not be denied.
I'm professionally working in it security since 2005, I have nothing to earn from dedicating time in bringing suggestions there, other than trying to make the internet a safer place to stay (that's the reason I work on opensource security project since so much time).
Consider that when thinking that I am insulting and that I'm just trolling, I'm trying to bring topic that got just denied, rather than being acknowledged and then discussed to find out a step-by-step solutions.
Have a good night, and hope the conversation could goes on.
Keeping the thread active is not going to do anything. Insulting us will not change anything. Go away with your hatred, your irrespect and your aggressiveness.
@JB Again, I'm not insulting you and you will not find a single insult from my against you.
Think about it, that maybe an excuse to avoid considering the security issues and the proposed improvement, but denying a scientifically correct statement is not the right way to go for the improvement of VLC project.
One approach is to find your most trustworthy security expert within your closed ties and have him independently read those tickets, then just listen carefully at his suggestions.