Tag: Certificate Transparency

  • Hacker News: How to distrust a CA without any certificate errors

    Source URL: https://dadrian.io/blog/posts/sct-not-after/ Source: Hacker News Title: How to distrust a CA without any certificate errors Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses the concept of “distrust” in the context of certificate authorities (CAs) that issue HTTPS certificates, emphasizing changes in the management of certificate trustworthiness due to compliance failures…

  • Hacker News: Certificate Transparency in Firefox: A Big Step for Web Security

    Source URL: https://blog.transparency.dev/ct-in-firefox Source: Hacker News Title: Certificate Transparency in Firefox: A Big Step for Web Security Feedly Summary: Comments AI Summary and Description: Yes Summary: The implementation of Certificate Transparency (CT) enforcement in Firefox marks a significant advancement in web security, enhancing protection against certificate fraud and man-in-the-middle attacks. This change demands compliance from…

  • Hacker News: PostgreSQL Support for Certificate Transparency Logs Now Available

    Source URL: https://blog.transparency.dev/postgresql-support-for-certificate-transparency-logs-released Source: Hacker News Title: PostgreSQL Support for Certificate Transparency Logs Now Available Feedly Summary: Comments AI Summary and Description: Yes Summary: The recent integration of PostgreSQL as a storage backend for the Trillian certificate transparency ecosystem enhances data integrity and reliability for log operators. This shift, motivated by previous log failures, allows…

  • Hacker News: Certificate Authorities and the Fragility of Internet Safety

    Source URL: https://azeemba.com/posts/certificate-authorities-and-the-fragility-of-internet-safety.html Source: Hacker News Title: Certificate Authorities and the Fragility of Internet Safety Feedly Summary: Comments AI Summary and Description: Yes Summary: The provided text offers a deep examination of HTTPS and the critical role of Certificate Authorities (CAs) in ensuring internet security. It discusses the potential vulnerabilities in the certificate verification process…

  • Hacker News: Certificate Authorities and the Fragility of Internet Safety

    Source URL: https://azeemba.com/posts/certificate-authorities-and-the-fragility-of-internet-safety.html Source: Hacker News Title: Certificate Authorities and the Fragility of Internet Safety Feedly Summary: Comments AI Summary and Description: Yes Summary: The provided text offers a deep examination of HTTPS and the critical role of Certificate Authorities (CAs) in ensuring internet security. It discusses the potential vulnerabilities in the certificate verification process…

  • Cloud Blog: Bridging the Gap: Elevating Red Team Assessments with Application Security Testing

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/red-team-application-security-testing/ Source: Cloud Blog Title: Bridging the Gap: Elevating Red Team Assessments with Application Security Testing Feedly Summary: Written by: Ilyass El Hadi, Louis Dion-Marcil, Charles Prevost Executive Summary Whether through a comprehensive Red Team engagement or a targeted external assessment, incorporating application security (AppSec) expertise enables organizations to better simulate the tactics and…

  • Hacker News: Certificate Authorities and the Fragility of Internet Safety

    Source URL: https://azeemba.com/posts/certificate-authorities-and-the-fragility-of-internet-safety.html Source: Hacker News Title: Certificate Authorities and the Fragility of Internet Safety Feedly Summary: Comments AI Summary and Description: Yes Summary: The provided text offers a deep examination of HTTPS and the critical role of Certificate Authorities (CAs) in ensuring internet security. It discusses the potential vulnerabilities in the certificate verification process…

  • Hacker News: Avoiding downtime: modern alternatives to outdated certificate pinning practices

    Source URL: https://blog.cloudflare.com/why-certificate-pinning-is-outdated Source: Hacker News Title: Avoiding downtime: modern alternatives to outdated certificate pinning practices Feedly Summary: Comments AI Summary and Description: Yes Summary: The text critically examines the practice of certificate pinning in the evolving landscape of Public Key Infrastructure (PKI). It highlights the risks and management challenges associated with keeping pinned certificates…