this post was submitted on 29 Jul 2025
380 points (100.0% liked)

196

18215 readers
348 users here now

Be sure to follow the rule before you head out.


Rule: You must post before you leave.



Other rules

Behavior rules:

Posting rules:

NSFW: NSFW content is permitted but it must be tagged and have content warnings. Anything that doesn't adhere to this will be removed. Content warnings should be added like: [penis], [explicit description of sex]. Non-sexualized breasts of any gender are not considered inappropriate and therefore do not need to be blurred/tagged.

If you have any questions, feel free to contact us on our matrix channel or email.

Other 196's:

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] far_university1990@reddthat.com 5 points 2 weeks ago (1 children)

Man in the middle:

You <-cert for x sign by ca-> x

You <-cert for x sign by ca (fake, gov control)-> gov.spy <-cert for x sign by ca-> x (optional)

To x look like gov.spy is you, gov.spy like proxy. And gov.spy can try force your device connect to gov.spy instead x (dns poison, isp force ip redirect, ...). Will look like x (domain resolve to gov.spy ip, but cannot know), have valid cert for x, trusted.

[–] hildegarde@lemmy.blahaj.zone 2 points 2 weeks ago (1 children)

For that, the government needs to be in the middle of the communication channel. That would take a lot more than just replacing the key on the keyserver.

[–] far_university1990@reddthat.com 4 points 2 weeks ago

And gov.spy can try force your device connect to gov.spy instead x (dns poison, isp force ip redirect, ...).

Internet rely on dns and ip. CA only relevant for internet communication. Take more, but not much more.