Bonum Certa Men Certa

Transport Layer Security (TLS) is Fine, Centralised Certificate Authorities (CAs) Are Not

Video download link | md5sum b147528fd1ea28881ed4578632fbd8b7 War on Decentralised Internet and Computing Creative Commons Attribution-No Derivative Works 4.0



Summary: There's a lot of misconception/misunderstandings about what the Certificate Authorities (CAs) are, what they're for, how they work, and why they don't actually tackle the biggest security and privacy problems, they're mostly about centralisation of control and outsourcing of "trust" from pertinent sites/services to monopolies, empires, and oligarchs

SOME days ago someone was "[s]houting out to @tuxmachines to check your server. SSL certificate-based error messages are flying..."



This was not unforeseen. A lot of people sadly believe what Web browsers tell them, not bothering to take into account the agenda promoted by such Web browsers. It's about control and centralisation, it's not about security and/or privacy. A "malicious Web site can easily get a TLS certificate from a CA and turn the padlock on your browser green and go ahead and load," DaemonFC reminds us. "And it's still a malicious Web site."

"Let's Encrypt even admits that they do nothing to protect you from a malicious Web site, and suggest reporting those to Google and Microsoft," DaemonFC adds.

"A lot has happened since then, notably Russia's invasion of Ukraine, which resulted in a lot of censorship inside Russia, by Russia, and against Russia."Those who say that getting a 'good' certificate is 'free' may be missing the point. It is like buying a 'secure' boot certificate from Microsoft on the 'cheap' (until the OEMs toss them out). We wrote about this in relation to Certificate Authorities before, with focus on the "big fish", Let's Encrypt [1, 2, 3], or LE.

The video above revisits this subject. A lot has happened since then, notably Russia's invasion of Ukraine, which resulted in a lot of censorship inside Russia, by Russia, and against Russia. Now that the centralised systems are in place, censorship is vastly stronger. Is this security???

A given Gemini address is accessible so long as there's a certificate in place, even a self-signed one (vouching for oneself). The same model ought to have been adopted for the Web. For online banking it would help if banks sent expected fingerprints, e.g. by post. Outsourcing to monopolies isn't the way to go.

"Outsourcing to monopolies isn't the way to go."Readers might correctly spot the resemblance or notice the similarity to UEFI 'secure' boot. First they start with recommendations, saying it is all about security and enhancing safety. And then intimidation, seeking compliance from people who disregard the recommendations. Finally, they resort to outright locking out (blocking) anything that is not submissive, e.g. after 90% or more have already surrendered. So this is a form of blackmail for lock-down, initially marketed as a well-meaning security scheme. They're insincere about motives. Nothing here is "free"...

Right now, after we've witnessed expansion in Web censorship, we believe stronger resistance will be needed by explaining to people what's happening. Remember that this is not about security; it's all about control and one day revoking certificates can be weaponised further and further, just like DNS-level censorship, denial of ClownFlare access, and so on. They typically start with "pirates", "terrorism", and "the children" before resorting to political angles. CAs can very easily and immediately be leveraged for outright censorship.

"Finally, they resort to outright locking out (blocking) anything that is not submissive, e.g. after 90% or more have already surrendered."In the video above I remind people that the Linux Foundation's LE has already revoked millions of cerificates before (without even properly explaining what had happened!) and it'll happen again sooner or later. Maybe at some point they'll just decide to revoke all LE certificates for Russian sites, citing some political "sanctions". Then what? Who's next?

As an associate noted yesterday, "those that control the signing authorities can issue revocations at any time they feel like it and for any reason they feel like..."

In the case of Debian, we recently saw how trademarks get leveraged to censor criticism and hide problems. They just confiscate critics' Web sites. Maybe we'll do a video about this soon, seeing that the debian.community site is now succeeded by debian.day and debian.news. It's a namespace battle in DNS.

DaemonFC concludes: "The only thing that HTTPS does do is help keep what you do to interact with the server private from outsiders, and that is important. But if you fall for a site claiming to be your bank because it has a green padlock, that doesn't help you avoid a scam. One of the reasons I used to promote HTTPS Everywhere to everyone was because I believed the user should have the option to try to force it on with as many sites as possible. But I never would have argued for a system where HTTP is basically deprecated without TLS and browsers try to say there's something wrong with accessing such a Web site if you don't mind your information between your browser and that site remaining private. It's a good "upgrade". It is. It stops things like the Man-In-The-Middle Attacks that Comcast was using in order to spam its customers and inject advertisements into Web pages. So that's why I started using it. I thought it was outrageous that wherever I went, here's Comcast injecting alerts about data usage or ads for their TV package into my Google searches. HTTPS breaking that is a happy side-effect of what it does."

"I was big on the idea of bringing CACert into the certificates package used by Mozilla, but they always found some bullshit reason not to. Like, they didn't even want to talk about it. The whole situation with certificates is a legacy of Netscape. All of the old "players" that are really valuable and "trusted" by just about everything started out that way because Netscape Corporation put them in the Netscape Navigator browser. Then Microsoft came along with their stolen Internet Explorer product (they stiffed Spyglass Mosaic and then didn't pay them) and lobbed all the same certificates in so that sites working in Netscape Navigator would also load in Internet Explorer. And then the tragedy just kept expanding from there. Opera had to throw all the same certificates in because they've never had more than 2% of the browser market. The user has really no control over how this works. It's always been 100% Big Business. From Netscape to Microsoft to Apple and Google."

"Remember when they had that Diginotar CA that was compromised? An entire CA! They had to revoke and remove an entire CA. What a mess that was. Everything in that "chain of trust" was broken and all the sites that used it had to get new certificates, and many Windows and Mac developers got caught with their pants down and had security alerts warning the users not to install the software that the OS was saying "THIS IS FINE!" about yesterday. That was hilarious, and sad. Sad because everyone watched what ensued and nothing was fixed. They revoked one CA and caused all sorts of Hell, but it could happen with any of them."

They still push this very same agenda for software, not only Web sites, various services (including IRC), and booting.

MinceR then said that "PKI as a whole is badly designed."

Recent Techrights' Posts

Even Microsoft (MSN) Covers Richard Stallman's Public Talk in Milan 2 Days Ago
He spoke in Spanish earlier this month (Alicante)
Very High Attendance Level at Richard Stallman's Talk Shows People Can Relate to His Message
Smear campaigns have their limits
 
Links 28/05/2025: 'Emulation Layers' (Measurements and Linguistics), Libraries, and Discomfort
Links for the day
Links 28/05/2025: More Arrests for Bitcoin-Connected Torture and Prosecutions for Dieselgate-Linked Executives
Links for the day
Gemini Links 28/05/2025: Techo-authoritarianism With Slop Plagiarism and "No Online June" (Going Offline)
Links for the day
Links 28/05/2025: GitHub MCP Exploited and MathWorks Discovers Huge Windows TCO
Links for the day
Microsofters Were Scheming to Take Over This Entire Web Site (in Their Own Words!)
Money gets spent censoring/deplatforming people who speak about real issues; no money gets spent actually tackling those underlying issues
Gemini Links 28/05/2025: Celsius-Fahrenheit, Endless Scrolling/Infinite Scrolling, and Trapping LLM Slop Bots
Links for the day
Bicycles for the Minds and the Story Harrison Bergeron
"The goal of having people in charge of the tools they use and that the tools should amplify ability" has long been abandoned
Prison gate backdrop to baptism by Fr Sean O'Connell, St Paul's, Coburg
Reprinted with permission from Daniel Pocock
More Photos From This Week's Milan Talk by Richard Stallman
The posts are in Italian, not English
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, May 27, 2025
IRC logs for Tuesday, May 27, 2025
Links 27/05/2025: Science Defunded, India Arrests an Academic
Links for the day
Gemini Links 27/05/2025: From Celsius to Fahrenheit and Deleting Social Control Media
Links for the day
Microsofters Have, in Effect, Attempted Extrajudicial Action Against Us
Courts and Judges (or Masters) don't exist to facilitate this kind of "bro" culture
UK High Court Masters Are Not Your Jesters, Microsoft
Judges aren't there for "funny" spectacles, they're there to act as arbiters in critical cases, not SLAPPs
Links 27/05/2025: Mass Layoffs at Volvo and More Evidence of 'AI' (Slop) Being a Passing Fad
Links for the day
The Code of Conduct (CoC) Gaslighting Phenomenon
There are still many people and projects foolish enough to outsource their labour to Microsoft via GitHub
They're Very Jealous of Richard Stallman and His Freedom (or Simple Lifestyle)
Jealousy is toxic because it can cause rational people to act irrationally and even severely harm themselves
Akira Urushibata on GNU coreutils
new message
Anouk Rozestraten (Deputy Director) Appears to Have Left the Free Software Foundation
Let's hope Rozestraten is still using and promoting Free software
There's Nothing Funny About Lawbreaking
There's plenty of room in society for humour, but "hacking" the state by breaking laws isn't cool or hip
More Mass Layoffs Coming Soon to Microsoft, Just a Question of When and How Many
Numbers from Washington were close to 5% and judging by prior rumours, it would be 5% + 5% (total 10%) at a later month
Links 27/05/2025: Bikes, Ideal Computers, and BYO
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, May 26, 2025
IRC logs for Monday, May 26, 2025
Richard Stallman's Milan Talk (Public Presentation) Was Packed, Video Available Soon
Looks like they even ran out of seats
Gemini Links 26/05/2025: Intangible Stuff and Slop Issues
Links for the day
The Openwashing Shills Initiative (OSI) - Part I: Complaints to IRS or USDOJ Needed
If enough people do it, this will be more effective, more so if people who are based in the US do it
Open Source Initiative (OSI) Lobbying and the OSI's Status at Stake
At the end we plan to summarise all the issues in one very long article
Breaking Into Other People's Devices Without Authorisation Isn't "Funny" or "Research"
“Chaos was the law of nature; order was the dream of man.”
The Issue Isn't the Internet, the Issue is How People Are Taught to Use or Misuse It
The Web is circling down the drain. The Internet is not.
A Healed Reputation of a Movement's Leader and His Robust Message
The more aggressively you push against resistors, the more credibility they will gain
Links 26/05/2025: Deletions from Microsoft's GitHub, Telegram Blocked in Vietnam
Links for the day
Linux Released Last Night and There's Already LLM Slop With Slop Images
BetaNoise does not seem to mind this anymore
Links 26/05/2025: Walmart Layoffs and DRM Dumpster Fire ('Old' Fire TV Devices Lose Netflix Access)
Links for the day
Gemini Links 26/05/2025: USB Camera Viewer and Fantasy Life
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, May 25, 2025
IRC logs for Sunday, May 25, 2025