this post was submitted on 02 Nov 2023
549 points (98.6% liked)

Programmer Humor

32472 readers
467 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 28 points 1 year ago (4 children)

The legislation requires web browsers to trust EU countries' CAs (which browsers already tend to do, but are presently free to remove when they're observed being misused) and prohibits doing non-ETSI-approved validity checks (eg, certificate transparency, which is a way CA-misusing MITM attackers can be caught).

Wouldn't you say the point of that particular clause is to reduce browser security (so that cops and intelligence agencies are free to exploit it without interference from CT)?

[–] [email protected] -1 points 1 year ago* (last edited 11 months ago) (3 children)

[This comment has been deleted by an automated system]

[–] [email protected] 5 points 1 year ago (1 children)

If they wanted to make browsers less secure, they would do so in much more obvious ways.

The new proposal demands browsers automatically trust government created root certificates. That means any EU government can do a man-in-the-middle attack on any end user running that web browser, even users in other countries. There is no reason to do that other than to spy on people or to manipulate the content that they're viewing.

If any government, or company for that matter, wants to make their own root cert and deploy it to all their users/machines they can already do that easily. A lot of companies that work with sensitive data already do this, and some companies (ex: symantec) provide solutions to do it very easily, so the IT team can see everything the users are doing.

load more comments (1 replies)
load more comments (1 replies)