TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Is Let's Encrypt the new swiss crypto ag?

18 点作者 Coxa超过 5 年前
Just wondering ... it does seem less far-fetched in the light of the swiss crypto ag revelations.

5 条评论

infogulch超过 5 年前
Are you familiar with how certificates and CAs work in general? You don&#x27;t <i>receive</i> a certificate from the CA, they just sign and <i>attest</i> that the one you made is owned by you. The ways CAs go bad is not breaking any crypto but by signing a certificate that you don&#x27;t own. This vulnerability is well known and LE takes industry-leading steps to mitigate it via the certificate transparency program which is a permanent auditable log of all certificates they sign.
评论 #22358106 未加载
评论 #22359738 未加载
tree3超过 5 年前
Why are you specifically targeting LE with this post? Why not other CAs?
评论 #22358480 未加载
jeffrallen超过 5 年前
As a centralized piece of software that has made itself responsible for safely massaging millions of private keys, certbot would certainly be a juicy target for NSA to compromise.
smoyer超过 5 年前
Betteridge&#x27;s Law says &quot;No&quot; ... and given certificates are generated locally, I don&#x27;t see how the certificates themselves could be compromised. The trust in a certificate (or trust in a false certificate) could potentially be manipulated in by and upstream party.
评论 #22357807 未加载
drummer超过 5 年前
I suppose it would be trivial for them to issue compromised certificates or record the private key in a targetted attack for a specific domain without anyone noticing.
评论 #22358666 未加载
评论 #22358399 未加载