this post was submitted on 21 May 2024
97 points (92.9% liked)

Technology

59429 readers
3081 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

So this video explains how https works. What I don't get is what if a hacker in the middle pretended to be the server and provided me with the box and the public key. wouldn't he be able to decrypt the message with his private key? I'm not a tech expert, but just curious and trying to learn.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 80 points 6 months ago* (last edited 6 months ago) (19 children)

All TLS/HTTPS clients have a set of Certificate Authority keys which they trust. Your client will only accept a public key which is signed by a trusted CA's key. A proper CA will not sign a key for a domain when it has not verified that the entity that wants it's key signed actually controls the domain.

[–] [email protected] 58 points 6 months ago (18 children)

A proper CA will not sign a key for a domain when it has not verified that the entity that wants it's key signed actually controls the domain.

Most browsers trust many certificate authorities from all over the world.

Any of them could...

  • be compelled by authority
  • be compelled by threat
  • be hacked
  • have a lapse in ethics
  • have a rogue employee
  • etc.

...and yes, it has happened already.

HTTPS as most of us use it today is useful, but far from foolproof. This is why various additional measures, like certificate pinning, private CAs, and consensus validation are sometimes used.

[–] [email protected] 23 points 6 months ago

Thats why we now have certificate transparency reports and CA-records.
Sure not perfect, but at least with a compliant CA it wont just happen in the dark.
At some point you have to trust someone.

load more comments (17 replies)
load more comments (17 replies)