11.07.20

Let’s Encrypt is Garbage, Albeit It’s Disguised as ‘Free’ Privacy

Posted in Deception, GNU/Linux, Google, Microsoft, Security at 12:33 pm by Dr. Roy Schestowitz

Earlier this year (an unexplained incident, still): Techrights Urges Readers to Ask the Linux Foundation’s Let’s Encrypt (Backed by Companies That Give the NSA Back Doors) Some Hard But Legitimate Questions

Let's Encrypt address

Let's Encrypt LF connection

Let's Encrypt and LF

The signature for Let's Encrypt

Source: The latest-available IRS filing. See the IRS filing in full [PDF] for a lot more.

Summary: The ‘Linux’ Foundation in ‘privacy’ clothing is more like a monopoly disguised as non-profit while taking money from monopolies (to do their biddings in the most surveillance-intensive country in the entire world)

Yesterday we asserted (and then explained why) today’s Linux Foundation — or LF for short (one way to avoid the misleading name) — works for monopolies, not Linux. It uses the “Linux” brand to market itself.

One thing that came from LF is a CA that issues loads and loads of certificates which expire after 3 months.

“The aspect nobody wishes to talk about is that the Let’s Encrypt monopoly is reinforcing monopoly and monopolies (Let’s Encrypt itself is fast becoming a monopoly and it helps large companies further monpolise and thus centralise the Web).”Look who backs this. Look who funds this. Look where the code is hosted (proprietary Microsoft GitHub). Even the site itself is outsourced to proprietary Microsoft GitHub…

Let’s Encrypt is partly funded by Microsoft/GitHub and various other unsavoury companies notorious for their back doors (we can name more than a handful).

So much for security, considering how close Microsoft and the NSA have long been.

But that’s not the point. That’s not the most important thing.

The aspect nobody wishes to talk about is that the Let’s Encrypt monopoly is reinforcing monopoly and monopolies (Let’s Encrypt itself is fast becoming a monopoly and it helps large companies further monpolise and thus centralise the Web).

It may sound peculiar at first, but considering the FIDO situation we’ve seen it elsewhere as well. Much power can be gained — sometimes money follows — by making oneself the de facto standard. Then abuse and chaos may ensue, as monopolies need not compete and appease/please anyboby.

Yesterday the Let’s Encrypt site published a blog post which bears a rather meaningless if not misleading headline (because a suitable headline would likely upset people right from the get-go).

Put in simple terms, sites that adopt HTTPS with the ‘free’ (so-called, hence scare quotes) Let’s Encrypt will become inaccessible to a lot of visitors. In the name of fake ‘privacy’, which does nothing about spying at the endpoints (like data sales to brokers). People who think HTTPS ‘means privacy’ should remind themselves that companies like Facebook — a Let’s Encrypt sponsor — use HTTPS and it does nothing to prevent Facebook from assaulting privacy like Microsoft assaults love itself. HTTPS helps secure things not at the endpoints but during transit.

LWN’s headline was vastly more informative than the waffle from Let’s Encrypt and it said:

Fallout from upcoming Let’s Encrypt certificate changes

As described in this Let’s Encrypt blog entry, certificates issued by Let’s Encrypt will soon be signed solely by that organization’s own root certificate, which is accepted by all modern browsers. There is one little catch, though: versions of Android prior to 7.1.1 (released in late 2016) do not recognize that certificate and will start throwing errors. “Currently, 66.2% of Android devices are running version 7.1 or above. The remaining 33.8% of Android devices will eventually start getting certificate errors when users visit sites that have a Let’s Encrypt certificate. In our communications with large integrators, we have found that this represents around 1-5% of traffic to their sites.” There appears to be little to be done about this problem other than to encourage owners of older Android devices to install Firefox.

It quotes part of what Jacob Hoffman-Andrews said, followed by: “Hopefully these numbers will be lower by the time DST Root X3 expires next year, but the change may not be very significant.”

Next year?

Let's Encrypt moneyJust one year? Hardly anything would change by then. See the comments in LWN. One person said: “Rooting old phones requires erasing them. I’d hazard that the users of those phones would be cautious about that (data loss), as opposed to current phones (loss of access to baking and game apps).”

They’re pushing people to buy new so-called ‘phones’ (spying devices). And further down it says: “Plausibly deniable way to send users up the upgrade treadmill. C’mon, Android users! Throw away your devices, again!”

Why would anyone wish to turn away users in the name of fake ‘privacy’ or dubious levels of confidentiality? If the Let’s Encrypt folks somehow hand over keys to the government (e.g. under Trump NSLs), then what good is it really? It not only helps monopolies but also militant empires.

Let’s Encrypt may claim to be a liberating and democratising force, but that’s assuming it does what it says on the tin.

An encrypted systems specialist elaborated on this. “Trust should only exist between the provider of data and the consumer,” he said to us. “Any other third party introduced into the system is an attack against privacy, security, and autonomy. Don’t let quacks convince you otherwise.”

“The discussion should lead the user to devices and browsers that let them have a local list of public keys they trust. That’s the basic function of TLS anyways. The concept of a CA needs to be binned altogether. You can still trust certs yourself on Firefox. Just ignore the browser warnings.”

He added that “what [we] should tell users is to start trusting self-signed certificates in favour of certs provided by CAs. Let’s Encrypt is a vehicle for maintaining the trust monopoly. It’s free so people blindly just use it, without realising they’re just further entrenching the trust monopoly. Anyone can generate TLS certs with openssl (or even more secure libressl; libressl is by the OpenBSD team. It’s the best TLS software around. There’s nothing magical about TLS certificates. If someone has something like WordPress, you can just use libressl to generate your own certs and then put a banner on the top of your info page on your website asking users to trust whichever cert you generated and hasn’t expired [and] what we really need in a truly security-and-privacy respecting Web browser is one that rejects all TLS certificates by default and only accepts certs the user agrees to accept. Right now the situation is the opposite of what it should be. Users have monopolised “trust providers” dictate which certs they accept. Kind of how you do when you set up SSH. You block all public keys by default and only allow ones you trust yourself. And you, the user, have full control of your trust system. Delegation of trust mechanisms to third parties is flagrant stupidity in any security system. In summary: right now you, the user, have a dictator ordering you whom you can and cannot trust. This is absurd. Your devices and software shouldn’t stop functioning when you want to take back control over your trust. The current system is a dictatorship of CAs forcing people to give up control over their trust (and by extension, their security and privacy). These are abuses against articles 12 and 19 of the Universal Declaration of Human Rights.”

Don’t forget that Let’s Encrypt is US-based and monopolies-backed. They’re not a charity, not a nonprofit either. They have motivations that aren’t altruistic and we know who pays the salaries (not friends and allies of privacy, sometimes foes of it). They call themselves “[a] nonprofit Certificate Authority providing TLS certificates to 225 million websites.” The Linux Foundation also calls itself “nonprofit”, but we know that's a lie.

The encrypted systems specialist said he “[had] forgot[ten] to mention one other big point. The fact you can’t block CAs in your browser and certain certificates is evidence enough of the malice behind the design and implementation of the web today.”

The incidents of March (earlier this year) could be seen as an eye-opener. They never bothered explaining why they had issued millions of bad certificates, which they later revoked; they didn’t explain what actually caused this incident and what was done about it.

As a side note, the SELinux project of Red Hat (now IBM) used to issue monthly declarations about no government interventions/involvement. Those stopped years ago. What is it they say about canaries?

“I have never seen any letsencrypt documentation say they have canaries,” oiaohm wrote this morning, “and if you know USA law on the matter canaries is basically false. One of the USA encrypted email systems that is shutdown now had canaries and when the NSA with NSL stepped in they were forbid from using them. So their end users knew nothing.”

A lot more discussion regarding this issue can be found in tomorrow’s IRC logs.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

This post is also available in Gemini over at:

gemini://gemini.techrights.org/2020/11/07/free-privacy-lunch/

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

A Single Comment

  1. Canta said,

    November 7, 2020 at 3:32 pm

    Gravatar

    Wait a sec.

    I agree with mostly everything. Specially the part about monopoly and CAs, and most specially about the stupidity behind “not trusting self signed certs”. Yet, please consider this other argument.

    When Let’s Encrypt started, there was a debate about the gratis side of its certificates. “Why are those free, when people had to pay dozens or hundreds of dollars until today?”. And there I saw something argued about two different functionalities for the certificates: the first one was the encryption, but the other was the identity certification. And falsing identity was a crime, and so there are economical penalties involved, and that’s the part where money comes in: CAs has to pay under certain circunstances, and they work kinda like insurance for some legal issues. Let’s Encrypt side of the debate said, basically, “screw identity certification, we’re just encrypting, as we want everything encrypted”.

    If what I say is true, then Let’s Encrypt is actually a force for good: because thanks to “standarized gratis certs”, even when monopolized, it doesn’t just break apart the need for money, but also renders the CAs absolutely irrelevant in 99.9% of the web. And so we can now talk about self signed certificates as the most basic common sense: Let’s Encrypt, a CA, is also irrelevant, because “we just want encryption”.

    Banks, goverment, and other sensible organizations, may still need CAs. I disagree with the “trust providers are idiotic”, as there are legit real life scenarios where trust providers are a decent idea (we use that in my country when you buy a house from someone, for example). Yet, it’s most likely out of place when talking about stuff like having my personal blog online (unless I’m some kind of VIP, and my identity matters somehow).

    So… we should be asking browsers to accept self-signed certs without ugly warnings. Lots of big tech players will agree with this, as they don’t like to update hardware or depend on third parties. Let’s Encrypt will die of irrelevance after that happens. And if that doesn’t ever happen, then we all know what will happen: Let’s Encrypt will start to behave like asses trying to exploit their monopoly, but gratis certs will be already the norm, and so others will start to also give gratis certs.

    Therefore, I don’t see the big deal with Let’s Encrypt, monopoly or not, and I see it more like a force positive for CAs obsolescense. Now, thanks in part to Let’s Encrypt, is a good time to ask for CAs removal from the game.

What Else is New


  1. Links 21/6/2021: Linux 5.13 RC7, IRC.com by Freenode

    Links for the day



  2. Virtual Injustice -- Part 13: Let the Games Continue…

    "It would be nice to think that the events of 28 May have given the Enlarged Board pause for thought."



  3. Links 20/6/2021: Akademy 2021 Underway and Linux Foundation Blasted

    Links for the day



  4. EPO: Fake Patents, Fake (Paid-for) Patent Coverage, and Fake Awards for Public Relations Purposes

    The media has been thoroughly corrupted, patent legitimacy has been severely damaged (far too many European Patents aren't in compliance with the EPC anymore), and Team UPC is trying to undermine the EPC and turn Europe into another Texas



  5. Changes in IRC and New Features Over Gemini Protocol or the World Wide Web

    We examine more closely some of the latest changes in the site and the capsule (Web and Gemini, respectively); we show that it’s possible to keep abreast of IRC using nothing but a text editor, a Gemini client… or even the command line alone



  6. IRC Proceedings: Saturday, June 19, 2021

    IRC logs for Saturday, June 19, 2021



  7. We Need and Deserve a Saner Patent System in Europe

    The laughing stock that the patent system, the patent law firms, and patent media became (over the past few years) must be replaced; at the moment we have a cabal connected to a bunch of criminals running the entire show and the public understandably grows impatient (at least people who are sufficiently informed; the criminals have already intimidated and bribed a lot of the media and they're still bribing more of it, as we shall demonstrate later today)



  8. [Meme] IRC Wars in a Nutshell

    In terms of large IRC networks, we’re in trouble (unless we self-host) because they seem to be dividing themselves along political lines rather than anything technical or something of an on-topic/relevant substance. Using networks for Free software projects/organisations to push one’s political agenda is not acceptable because it’s starting to seem like in IRC space, FN has become the Front Nationale (French) and LC is Liberal Coalition. Both FreeNode and Libera Chat have managed to turn from technical platforms into political parties, in effect using technical networks (intended for technical projects) to push someone's political agenda and thus misusing them for personal gain. There’s no free lunch. As it turns out, FreeNode’s new owner (Andrew Lee) has just outed himself as a huge Donald Trump supporter who speaks of “these fuckers who stole that shit” (he meant the election, which he insists Trump actually won in 2020).



  9. IBM Handles More Removals of Signatures From Its Hate Letter Against Richard Stallman

    Less than a day ago IBM processed a request for removal (from its hate letter); as someone put it in a letter to us, also less than a day ago: “When all of this started in 2019, the Red Hat GNU developers showed off their colours. The best way to attack an organisation is from the inside. Using GNU developers was a dead giveaway. Google and Microsoft are very much on the team with IBM. I believe they’ve made headway into the Free/Libre software community and have persuaded senior Debianties to go along with them.” That same message, from an anonymous GNU maintainer, said: “The strategy to target major distributions is clear and present danger. I’m not sure what arguments of persuasion are being used, but I’m pretty sure their main tool is currency. RMS needs a lot of strategic support from experts who will rally to the Free Software cause. He needs great lawyers, some corporate minds, and intelligence specialists.” Sometimes it seems or feels like by simply buying Red Hat (the staff) IBM infiltrated the GNU Project and now it is vainly making claims like 'GNU is IBM' and thus IBM et al can command/tell the FSF who should run FSF, not only GNU. Such entryism isn’t hard to see; “An open letter in support of Richard Matthew Stallman being reinstated by the Free Software Foundation” has meanwhile garnered 6,758 signatures. The opposite letter is only decreasing in support (signatures lost).



  10. Links 20/6/2021: Debian GNU/Linux 10.10 “Buster” Released and LF Revisionism Resumes

    Links for the day



  11. The EPO's Enlarged Board of Appeal Has Already Lost the Case in the Court of Public Opinion

    Personal views on the sordid state of the Enlarged Board of Appeal (EBoA), which by extension bodes poorly for the perception of independence in every Board of Appeal (BoA); the patent tribunals have been captured by patent maximalists who either stack the panels or intimidate judges into ruling in a particular way



  12. Virtual Injustice -- Part 12: Carl Josefsson – Down But Not Out!

    António Campinos still controls Josefsson, who controls all the judges, so in effect all the legal cases (including some about European software patents) are manipulated by the Office the judges are supposed to judge



  13. Links 19/6/2021: Wine 6.11 and Proton 6.3-5 RC

    Links for the day



  14. IRC Proceedings: Friday, June 18, 2021

    IRC logs for Friday, June 18, 2021



  15. Virtual Injustice -- Part 11: Perceptive Comments and Caustic Criticism

    The EPO‘s management managed to silence a lot of the critical media (handouts and threats from Benoît Battistelli and António Campinos), but silencing comments is a lot harder; though we don’t know which ones were moderated out of existence…



  16. Links 18/6/2021: Mir 2.4, ActivityWatch 0.11, Microsoft Breaks Its Own Repos

    Links for the day



  17. [Meme] When the 'Court' Drops

    As the EPO sneakily outsourced courts to American companies and parties in dispute depend on their ISP for “access to justice” there’s a catastrophic impact on the very concept of justice or the right to be heard (sometimes you don’t hear anything and/or cannot be heard)



  18. The EPO's Virtual Injustice and Virtual ('News') Media

    A discussion of this morning's post (part 10 in a series) about the shallow media/blog coverage that followed or accompanied last month's notorious EPO hearing



  19. Links 18/6/2021: LibreOffice 7.2 Beta, Elementary OS 6.0 Beta 2, and Linux Mint 20.2 “Uma” Beta

    Links for the day



  20. The Self-Hosting Song

    Cautionary tales about outsourcing one's systems to companies that could not care less about anyone but themselves



  21. IRC Proceedings: Thursday, June 17, 2021

    IRC logs for Thursday, June 17, 2021



  22. [Meme] Swedish Justice

    The EPO‘s patent tribunals have been mostly symbolic under the Benoît Battistelli and António Campinos regimes; giving them back their autonomy (and removing those who help Battistelli and Campinos attack their autonomy) is the only way to go now



  23. Virtual Injustice -- Part 10: Vapid and Superficial Coverage in the 'IP' Blogosphere

    The media has come under attack by Benoît Battistelli; during the term of António Campinos most of the media critical of the EPO has mostly vanished already; so one needs to look carefully at comments and social control media



  24. Links 18/6/2021: RasPad 3 and Pushing Rust Into the Linux Kernel

    Links for the day



  25. Heli Pihlajamaa Promoting Software Patents to Patent Maximalists

    "Ms Pyjamas" from the EPO is promoting illegal software patents to a bunch of patent zealots (CIPA)



  26. The Lying by Team UPC, Led Again by Kevin Mooney

    Team UPC, or specifically Mr. Mooney, lies to the public about the prospects of the UPC; similarly, EPO and EU officials keep bringing up false claims about the UPC, so while the UPC itself has likely died for good the lies have not



  27. Links 17/6/2021: Cutelyst 3 and Lenovo Move Towards ThinkPad BIOS Configuration From Within Linux

    Links for the day



  28. Too Much Noise and/or Distraction and General Loss of Focus (on the Real and Urgent Issues, Such as the Ongoing Anti-FSF 'Coup')

    The media is full of Microsoft fluff and technical blog posts still focus on the Freenode fiasco, among other things that don't matter all that much; but we certainly need to talk about steps undertaken to undermine the FSF's power because long-term ramifications may be huge



  29. [Meme] The Enlarged Bored People With Presidential Decrees

    The laughable state of the EPO‘s EBA (or EBoA) is rarely commented on anymore, not even in so-called ‘IP’ blogs; maybe they’re just so eager to see patents on everything, even European software patents, so tyrants who destroy the courts (with UPC lobbying and removal of EBA independence) don’t bother them so much anymore



  30. Response to Misinformation From EPO Officials

    Opponents of European software patents are clearly being mischaracterised by EPO officials, who also use meaningless buzzwords to promote such patents; as an aside or footnote that relates to our ongoing series we’re making this quick video, which is days late


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts