this post was submitted on 28 Jun 2024
24 points (100.0% liked)

Cybersecurity

5695 readers
184 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] MajorHavoc@programming.dev 7 points 4 months ago* (last edited 4 months ago)

I would love to see the certificate authority model become less and less important.

"Can you write a small check to an organization we are all pretty sure isn't outright malicious?"

Is a surprisingly good pragmatic protection against malicious SSL certificates, I will admit.

But there's significant flaws with the approach - notably power dynamics and creation of large scary targets for bad actors.

I would love to see CA acceptance move from PASS/FAIL to a dynamic risk score, that is based on my own browsing behavior (calculated solely within my browser).

If I spend 90% of my time browsing domains at example(dot)mycorporation(dot)com, there's a great chance that anything new signed by the same authorities can be automatically trusted.

It would still put a lot of power in the hands of Amazon and Google, but would reduce that power in scale to the amount of services they're actually providing to each user.