Good news: the Chinese #CA https://www.bjca.cn/ (that is currently in the process of joining the #RootCA program in all our web browsers) has confirmed they have strong technical controls that separate their root CA business from their alleged #spyware business.
Bad news: The alleged spyware business, and tge fact these are bother under control of the same business.
This is genuinely fascinating watching a company basically destroy a large part of itself, not so much for what they originally did, but how they reacted when asked about it: https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/etbBho-VBQAJ?pli=1 #cacert #rootca #certificates #trustcor
#cacert #rootCA #certificates #trustcor
More on dodgy #rootCA
An Untrustworthy #TLS #Certificate in Browsers https://www.schneier.com/blog/archives/2022/11/an-untrustworthy-tls-certificate-in-browsers.html
RT @helpnetsecurity
Researchers shed light on hidden root CAs - https://www.helpnetsecurity.com/2021/11/19/hidden-root-cas-ecosystem/ - @QIHU_Official @Tsinghua_Uni @UCIrvine #webpki #HTTPS #rootca #certificates #security
#certificates #https #rootCA #webpki #security
https://scotthelme.co.uk/impending-doom-root-ca-expiring-legacy-clients/
C'est une problématique intéressante à laquelle on prête peu d'attention.
Lorsqu'on parle de machines connectées qui ne sont plus mises à jour, on pense immédiatement aux risques de sécurité que ça implique (plus de correctifs) et une incompatibilité avec de futures versions des logiciels.
1/n
#letsencrypt #certificate #expiry #rootCA #ca
Easy, Secure HTTPS With An ESP8266 via @hackaday https://hackaday.com/2020/07/02/easy-secure-https-with-an-esp8266/ #esp8266 #certificate #TLS #rootCA
#esp8266 #certificate #tls #rootCA