Bonum Certa Men Certa

Let's Encrypt is Garbage, Albeit It's Disguised as 'Free' Privacy

Earlier this year (an unexplained incident, still): Techrights Urges Readers to Ask the Linux Foundation's Let's Encrypt (Backed by Companies That Give the NSA Back Doors) Some Hard But Legitimate Questions

Let's Encrypt address

Let's Encrypt LF connection

Let's Encrypt and LF

The signature for Let's Encrypt

Source: The latest-available IRS filing. See the IRS filing in full [PDF] for a lot more.

Summary: The 'Linux' Foundation in 'privacy' clothing is more like a monopoly disguised as non-profit while taking money from monopolies (to do their biddings in the most surveillance-intensive country in the entire world)

Yesterday we asserted (and then explained why) today's Linux Foundation -- or LF for short (one way to avoid the misleading name) -- works for monopolies, not Linux. It uses the "Linux" brand to market itself.



One thing that came from LF is a CA that issues loads and loads of certificates which expire after 3 months.

"The aspect nobody wishes to talk about is that the Let's Encrypt monopoly is reinforcing monopoly and monopolies (Let's Encrypt itself is fast becoming a monopoly and it helps large companies further monpolise and thus centralise the Web)."Look who backs this. Look who funds this. Look where the code is hosted (proprietary Microsoft GitHub). Even the site itself is outsourced to proprietary Microsoft GitHub...

Let's Encrypt is partly funded by Microsoft/GitHub and various other unsavoury companies notorious for their back doors (we can name more than a handful).

So much for security, considering how close Microsoft and the NSA have long been.

But that's not the point. That's not the most important thing.

The aspect nobody wishes to talk about is that the Let's Encrypt monopoly is reinforcing monopoly and monopolies (Let's Encrypt itself is fast becoming a monopoly and it helps large companies further monpolise and thus centralise the Web).

It may sound peculiar at first, but considering the FIDO situation we've seen it elsewhere as well. Much power can be gained -- sometimes money follows -- by making oneself the de facto standard. Then abuse and chaos may ensue, as monopolies need not compete and appease/please anyboby.

Yesterday the Let's Encrypt site published a blog post which bears a rather meaningless if not misleading headline (because a suitable headline would likely upset people right from the get-go).

Put in simple terms, sites that adopt HTTPS with the 'free' (so-called, hence scare quotes) Let's Encrypt will become inaccessible to a lot of visitors. In the name of fake 'privacy', which does nothing about spying at the endpoints (like data sales to brokers). People who think HTTPS 'means privacy' should remind themselves that companies like Facebook -- a Let's Encrypt sponsor -- use HTTPS and it does nothing to prevent Facebook from assaulting privacy like Microsoft assaults love itself. HTTPS helps secure things not at the endpoints but during transit.

LWN's headline was vastly more informative than the waffle from Let's Encrypt and it said:

Fallout from upcoming Let's Encrypt certificate changes



As described in this Let's Encrypt blog entry, certificates issued by Let's Encrypt will soon be signed solely by that organization's own root certificate, which is accepted by all modern browsers. There is one little catch, though: versions of Android prior to 7.1.1 (released in late 2016) do not recognize that certificate and will start throwing errors. "Currently, 66.2% of Android devices are running version 7.1 or above. The remaining 33.8% of Android devices will eventually start getting certificate errors when users visit sites that have a Let’s Encrypt certificate. In our communications with large integrators, we have found that this represents around 1-5% of traffic to their sites." There appears to be little to be done about this problem other than to encourage owners of older Android devices to install Firefox.


It quotes part of what Jacob Hoffman-Andrews said, followed by: "Hopefully these numbers will be lower by the time DST Root X3 expires next year, but the change may not be very significant."

Next year?

Let's Encrypt moneyJust one year? Hardly anything would change by then. See the comments in LWN. One person said: "Rooting old phones requires erasing them. I'd hazard that the users of those phones would be cautious about that (data loss), as opposed to current phones (loss of access to baking and game apps)."

They're pushing people to buy new so-called 'phones' (spying devices). And further down it says: "Plausibly deniable way to send users up the upgrade treadmill. C'mon, Android users! Throw away your devices, again!"

Why would anyone wish to turn away users in the name of fake 'privacy' or dubious levels of confidentiality? If the Let's Encrypt folks somehow hand over keys to the government (e.g. under Trump NSLs), then what good is it really? It not only helps monopolies but also militant empires.

Let's Encrypt may claim to be a liberating and democratising force, but that's assuming it does what it says on the tin.

An encrypted systems specialist elaborated on this. "Trust should only exist between the provider of data and the consumer," he said to us. "Any other third party introduced into the system is an attack against privacy, security, and autonomy. Don't let quacks convince you otherwise."

"The discussion should lead the user to devices and browsers that let them have a local list of public keys they trust. That's the basic function of TLS anyways. The concept of a CA needs to be binned altogether. You can still trust certs yourself on Firefox. Just ignore the browser warnings."

He added that "what [we] should tell users is to start trusting self-signed certificates in favour of certs provided by CAs. Let's Encrypt is a vehicle for maintaining the trust monopoly. It's free so people blindly just use it, without realising they're just further entrenching the trust monopoly. Anyone can generate TLS certs with openssl (or even more secure libressl; libressl is by the OpenBSD team. It's the best TLS software around. There's nothing magical about TLS certificates. If someone has something like WordPress, you can just use libressl to generate your own certs and then put a banner on the top of your info page on your website asking users to trust whichever cert you generated and hasn't expired [and] what we really need in a truly security-and-privacy respecting Web browser is one that rejects all TLS certificates by default and only accepts certs the user agrees to accept. Right now the situation is the opposite of what it should be. Users have monopolised "trust providers" dictate which certs they accept. Kind of how you do when you set up SSH. You block all public keys by default and only allow ones you trust yourself. And you, the user, have full control of your trust system. Delegation of trust mechanisms to third parties is flagrant stupidity in any security system. In summary: right now you, the user, have a dictator ordering you whom you can and cannot trust. This is absurd. Your devices and software shouldn't stop functioning when you want to take back control over your trust. The current system is a dictatorship of CAs forcing people to give up control over their trust (and by extension, their security and privacy). These are abuses against articles 12 and 19 of the Universal Declaration of Human Rights."

Don't forget that Let's Encrypt is US-based and monopolies-backed. They're not a charity, not a nonprofit either. They have motivations that aren't altruistic and we know who pays the salaries (not friends and allies of privacy, sometimes foes of it). They call themselves "[a] nonprofit Certificate Authority providing TLS certificates to 225 million websites." The Linux Foundation also calls itself "nonprofit", but we know that's a lie.

The encrypted systems specialist said he "[had] forgot[ten] to mention one other big point. The fact you can't block CAs in your browser and certain certificates is evidence enough of the malice behind the design and implementation of the web today."

The incidents of March (earlier this year) could be seen as an eye-opener. They never bothered explaining why they had issued millions of bad certificates, which they later revoked; they didn't explain what actually caused this incident and what was done about it.

As a side note, the SELinux project of Red Hat (now IBM) used to issue monthly declarations about no government interventions/involvement. Those stopped years ago. What is it they say about canaries?

"I have never seen any letsencrypt documentation say they have canaries," oiaohm wrote this morning, "and if you know USA law on the matter canaries is basically false. One of the USA encrypted email systems that is shutdown now had canaries and when the NSA with NSL stepped in they were forbid from using them. So their end users knew nothing."

A lot more discussion regarding this issue can be found in tomorrow's IRC logs.

Comments

Recent Techrights' Posts

'Cancel Culture' Doesn't Work (in the Long Run)
Despite all the attacks, I'm enjoying life, I'm keeping productive, and our audience continues to grow
GNU/Linux Still up (statCounter Says to 6%) in Bosnia And Herzegovina
Let's see where it is at year's end
Making Layout Changes
Feedback can be sent to us
Behind an Economy of Fake 'Worths' and Fictional 'Valuations' or 'Market Caps'
They normalise white-collar crime and say "everyone is doing it!"
Links 18/01/2026: "South Africa is Running Out of Software Developers", Companies Spooked to Find Slop is a Major Liability
Links for the day
Place Your Bets: Who Will Die First? Microsoft or IBM?
Not even joking; make a guess
Restoring Professional Pride in the Tech Sector
Rejecting slop isn't being a Luddite
Slop Bubble "Is Worse Than The Dot Com Bubble"
Edward Zitron Says It like it is
 
Gemini Links 19/01/2026: Analog Cameras and Plucker in 2026, US Losing Acceptability in Europe
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, January 18, 2026
IRC logs for Sunday, January 18, 2026
Links 18/01/2026: The "Deepfake Porn Site Formerly Known as Twitter" and Turkey to Block Kids' Access to Social Control Media
Links for the day
Gemini Links 18/01/2026: Against English as Language of the Net, "Symposium of Destruction"
Links for the day
You Would Expect This Kind of Misleading Narrative Shortly Before Microsoft (or GAFAM) Mass Layoffs
misleading PR
FOSDEM 2026: democracy panel, GNOME & Sonny Piers modern slavery experiment
Reprinted with permission from Daniel Pocock
Pump-and-Dump With IBM Shares, Courtesy of People Who Stand to Gain From the 'Pump'
"3 Reasons to Buy IBM Stock Right Now"
IBM: Spying on Staff Like Never Before and Implementing Silent Layoffs This Month, Say Insiders
what we heard from whistleblowers seems to corroborate
IBM is Not a Free Software Company (It Never Was)
Red Hat's main product, RHEL, is full of secret sauce and has 'secret recipes' (it is basically proprietary)
IBM Turning Up the 'RTO' (Stress) and 'PIP' (Fear) Heat on Workers, Rebellion May be Brewing
Sometimes it feels like today's executives at IBM view IBM workers as a liability
Links 18/01/2026: Indonesia Against Comedy, Media-Hostile (Censors Comedians) Convicted Felon in White House Defecting to Opponents of NATO
Links for the day
Eventually the Joke (and Financial Fraud) is on Microsoft, Stigmatised for Slop
Is Microsoft trying to commit suicide?
GNU/Linux Leaps to All-time Highs in Virgin Islands
it seems to have started around the "end of 10"
Making and Keeping the Sites Accessible
Sometimes less does mean "more" (or "MOAR")
The "Alicante Mafia" - Part IV - How Europe's Largest Patent Office Recruited Drug Addicts, Antisemites, and People Who Absolutely Cannot Do the Job (But Know the 'Right' People)
To better overlap industrial actions we might delay/postpone/pause this series for a bit
Benefiting by Adding Presence in Geminispace
As the Web gets worse, not limited to bloat as a factor, people seek alternatives
Google News Recently Started Syndicating Another Slopfarm, Linuxiac
Even if Google is aware that there is slop there, it's hard to believe that Google will mind
Software Patents and USMCA (or NAFTA)
We recently pondered going back to issuing 2-3 articles per day about patents and common issues with them
IBM Sued Over PIPs
PIPs are "performance improvement plans"
Sites With "Linux" in Their Name That Are in Effect Slopfarms and Issue Fake Articles
We try to name some of the prolific culprits
Gemini Links 18/01/2026: Raising Notifications From Terminal and Environmental Sanity
Links for the day
IRC Proceedings: Saturday, January 17, 2026
IRC logs for Saturday, January 17, 2026
Over at Tux Machines...
GNU/Linux news for the past day
Links 17/01/2026: Internet Blackout Normalised, Russian Attacks Civilians by Causing Massive Blackouts
Links for the day
Microsoft Lunduke Keeps Distracting From the Real Problems With Rust
Microsoft Lunduke is stigmatising critics
Linuxiac Has Become a Slopfarm, Calling Them Out Isn't Fixing That
What a shame. A once-decent site about "Linux" bites the dust.
Luzern Lion Monument, Albanian Female Whistleblowers: Swiss jurists were cowards
Reprinted with permission from Daniel Pocock
The Splinternet is Already Here, Owing to the Militarisation of Technology (Slop, Social Control Media, Back Doors, and More)
you know what's gonna happen next...
Stack Ranking Against IBM/Red Hat Staff and a Signal of Mass Layoffs (RAs) Justified by Red Hat and IBM as Poor Performance/Misconduct/Other
Working in an atmosphere like this sounds like a nightmare
Gemini Links 17/01/2026: Slow computing and Environment Leak
Links for the day
Links 17/01/2026: US Censorship and Violence Crisis, Growing Anger Levels Against Slop Sold as "Intelligence"
Links for the day
Microsoft's "valuation depends on infrastructure that does not exist."
Indeed
The Typical Trajectory: Datamation Began Experimenting With LLM Slop for Fake Articles. Then Datamation Died. (Last Month)
It's always ending up this way
Accounts or Devices (e.g. Phones) That Get 'Burnt' Have Many Pitfalls
Embassies and consulates habitually fail at this
Avoiding the Spooks (Nobody Watches the Watchers, They're Practically Unaccountable)
If more people adopt encryption, it'll be easier for us to deal with whistleblowers
Protecting Whistleblowers Requires Technical Knowledge/Skills
even the highest media judges aren't aware of how to protect sources
At Least 5 Women Quit Brett Wilson LLP in Recent Months. It's the Firm That Attacked My Wife and I on Behalf of Americans (One of Them Strangled Women).
It seems like good news that the women escape this workplace
Slop About Slop and Slop About "Linux"
In short, avoid slopfarms
Report/Benchmark Says 'Vibe Coding' Results in Security Holes
There are risks they don't like talking about
EPO Abuses Covered in Spanish
Knowing what we know (and heard/saw), the sinister silence of the media is perceived by some to be complicity of the lower order.
Richard Stallman Encourages "ICE Out For Good" Protests, His Opponents Do Not (Passive and Uncaring About Human Rights)
He has done a lot philosophically, politically, and so on
Record Traffic in Geminispace or Over Gemini Protocol
it's never too late to join
The "Alicante Mafia" - Part III - Europe's Second-Largest Organisation on Strike, Protests, Other Industrial Actions to Come Impacting Over 95% of the Workforce
The EPO's management is highly evasive, weak, and vulnerable
Claim That IBM Marked 15% of its Workforce for Potential Layoffs
No wonder we keep hearing from Red Hat people who say they hate IBM
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, January 16, 2026
IRC logs for Friday, January 16, 2026