• CrinterScaked@sh.itjust.works
    link
    fedilink
    arrow-up
    40
    ·
    1 year ago

    There is no way a user can know the website is real the first time it’s visited, without it presenting a verifiable certificate. It would be disastrous to trust the site after the first time you connected. Users shouldn’t need to care about security to get the benefits of it. It should just be seamless.

    There are proposals out there to do away with the CAs (Decentralized PKI), but they require adoption by Web clients. Meanwhile, the Web clients (chrome) are often owned by the same companies that own the Certificate Authorities, so there’s no real incentive for them to build and adopt technology that would kill their $100+ million CA industry.

    • PowerCrazy@lemmy.ml
      link
      fedilink
      arrow-up
      2
      arrow-down
      7
      ·
      edit-2
      1 year ago

      There is no way a user can know that their traffic hasn’t been man-in-the-middled by a compromised CA either. And why is it “disastrous” to trust a website after you have cryptographically verified its the same website you visited before? It would present the same public/private key pair that you already trust.

        • PowerCrazy@lemmy.ml
          link
          fedilink
          arrow-up
          1
          arrow-down
          5
          ·
          1 year ago

          That’s where the SSH analogy comes from. On the initial connection you get the signature of the web-site you are trying to visit and your browser trusts it from then on. If something changes later, then the scary warning comes up.

      • UnculturedSwine@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        1 year ago

        No one can remove all risk but the security threshold between intercepting an initial connection and compromising a CA are vastly different. The latter would be much more difficult to pull off which is why we use them. Sounds like this EU rule is going to put a ceiling on that though.

      • topperharlie@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        making sure a small part is very secure vs having to verify every domain I visit? yeah, let me keep using the current system… are you aware of the amount of domains you connect to every day?

        Also, I might be wrong, but if I remember correctly browsers/OS-es tend to come with a list of trusted certificate keys already, which makes adding compromised keys to that list not as easy as you suggest. (I don’t even know if that happens or if they just update as part of security updates of OS/browsers)