id author title date pages extension mime words sentences flesch summary cache txt doi-org-6451 Secure the Internet | Nature .html text/html 2201 215 66 Software engineers must close the loophole used to intercept online communications, say Ben Laurie and Cory Doctorow. The software's cryptographic certificates, which securely verify the authenticity and integrity of Internet connections, bore an authorized signature. The keys used to sign the certificates had been stolen from a 'certificate authority' (CA), a trusted body (in this case, the Malaysian Agricultural Research and Development Institute) whose encrypted signature on a website or piece of software tells a browser program that the destination is bona fide. As more authorizing bodies are added to browsers' lists of trusted CAs, and as governments, hackers and unscrupulous insiders weaken the Internet's security system, it is becoming virtually impossible to know whether a connection is legitimate. Periodically â€" perhaps hourly â€" a number of 'monitor' servers contact the log servers and ask for a list of all the new certificates for which they have issued proofs. ./cache/doi-org-6451.html ./txt/doi-org-6451.txt