|
You are here |
techblog.bozho.net | ||
| | | | |
blog.dshr.org
|
|
| | | | | The security of encrypted Web traffic depends upon a set of Certificate Authorities (CAs). Browsers and operating systems are configured wit... | |
| | | | |
www.eff.org
|
|
| | | | | The EU is poised to pass a sweeping new regulation, eIDAS 2.0. Buried deep in the text is Article 45, which returns us to the dark ages of 2011, when certificate authorities (CAs) could collaborate with governments to spy on encrypted traffic-and get away with it. Article 45 forbids browsers from... | |
| | | | |
timilearning.com
|
|
| | | | | The systems we have seen so far are closed systems for which we have assumed that all the participants are trustworthy. But in an open system like the Web where anyone can take part, and there is no universally trusted authority, trust and security are top-level issues to address. Certificate Transparency is one approach to ensuring trust and improving security on the Web. | |
| | | | |
johnnywebber.com
|
|
| | | [AI summary] The content is a blog post comment section with a form for users to leave comments and a link to the article's URL. | ||