• 2 Posts
  • 190 Comments
Joined 2 years ago
cake
Cake day: June 21st, 2024

help-circle





  • One thing that annoys me about each statistic about posts is that I don’t know how many of these posts are actually interesting and engaged with.

    For example, there is a specific instance that just mirrors reddit content and has barely any engagement. The bot posts mulitple posts per hour, mostly without any comments or upvotes.

    It seems rather irrelevant to compare these posts to actually interesting posts with a nice discussion and a couple of upvotes.

    My suggestion would be to count and plot the number of posts that have at least a few interactions.








  • The maintainers of the big web browsers have pretty strict rules for CAs in this list. If any one of them gets caught issuing only one certificate maliciously, they are out of business.

    And all CAs are required to publish each certificate in multiple public, cryptographically signed ledgers.

    Sure, there is a history of CAs issuing certificates to people that shouldn’t have them (e.g. for espionage), but that is almost impossible now.




  • No, these are completely separate issues.

    • CRL: protect against certificates that have their private key compromised
    • CT: protect against incompetent or malicious Certificate Authorities.

    This is just one example why we have certificate transparency. Revocation wouldn’t be useful if it isn’t even known which certificates need revocation.

    The National Informatics Centre (NIC) of India, a subordinate CA of the Indian Controller of Certifying Authorities (India CCA), issues rogue certificates for Google and Yahoo domains. NIC claims that their issuance process was compromised and that only four certificates were misissued. However, Google is aware of misissued certificates not reported by NIC, so it can only be assumed that the scope of the breach is unknown.

    Source