this post was submitted on 02 Oct 2024
37 points (100.0% liked)

Privacy

789 readers
2 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

https://torrentfreak.com/italy-approves-piracy-shield-vpn-dns-proposal-risk-of-prison-for-isps-intact-241001/

As title. Italy is decided to pass a law that basically creates a chinese-type firewall in the country. The question is simple: even if I'm not doing anything illegal, my VPN provider will have to know what am I doing to report it in case it's illegal, or face jail.

So how could my traffic remain private in this scenario?

Can a VPN provider with no logs policy be held accountable of anything? Can it actually know what I'm doing?

you are viewing a single comment's thread
view the rest of the comments
[–] delirious_owl@discuss.online 1 points 1 month ago (1 children)

Yes, there is countless examples of root CAs containing compromised CAs. Also the private keys live on the server, hot. That's why we sign with release keys that are not stored on the publishing infr

[–] ShortN0te@lemmy.ml 1 points 1 month ago (1 children)

Yes, there is countless examples of root CAs containing compromised CAs.

Then pls proof that? Link to a recent article maybe?

[–] emuspawn@orbiting.observer 3 points 1 month ago (2 children)
[–] delirious_owl@discuss.online 2 points 1 month ago

DigiCert isn't the only one. There's a bunch of others. Just google "Mozilla CA removed" or "google CA removed"

Here's a couple more examples, but this sort of thing happens all the time, because X.509 is just a terrible design that breaks https

https://bugzilla.mozilla.org/show_bug.cgi?id=1567114

https://www.eff.org/deeplinks/2019/02/cyber-mercenary-groups-shouldnt-be-trusted-your-browser-or-anywhere-else

[–] ShortN0te@lemmy.ml 1 points 1 month ago

Yes, there is countless examples of root CAs containing compromised CAs.

This incidence with digicert is not about a compromised CA it is about a flaw in their validation system. That is not what you claimed. Such flaws happen from time to time, lets encrypt had an issue a while back too.