• 0 Posts
  • 26 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle

  • They could be, but I assume say like an apple device won’t install a ccp root authority unconditionally. Huawei and xiamoi probably could be forced, but the browser too, like Chrome, Firefox and safari need to also accept the device certificates as trusted.

    But the pressure in Europe would likely be to trade within Europe, you must comply.

    It fundamentally destroys the whole trust of PKI if this did go ahead. We just need to hope it does not.



  • A country for example could enact their mandatory certificate authority that they control. Then have ISPs who are in the middle use what was mandatory a trusted CA to act as the certificate issuer for a proxy. This already exists in enterprise, a router or proxy appliance is a mitm to inspect ssl traffic intercepting connections to a website say Google, but instead terminates that connection on itself, and creates a new connection to Google from itself. Since the Google certificate on the client side would be trusted from the proxy, all data would be decrypted on the proxy. to proxy data back to clients without a browser certificate trust issue, they use that already mandated CA that they control to create new certificates for the sites they’re proxying the proxy reencrypts it back to the client with a trusted certificate and browsers accept them.

    It’s actually less than theoretical, it’s literally been proposed in Europe. This method is robust and is already what happens in practice in enterprise organisations on company devices with the organisations CA certificate (installed onto organisation computers by policy or at build time). I’ve deployed and maintained this setup on barracuda firewalls, Fortigate firewalls and now Palo alto firewalls.

    https://www.itnews.com.au/news/eu-row-over-certificate-authority-mandates-continues-ahead-of-rule-change-602062









  • What would you suggest they sell on their Android store that users would be so encouraged to install a new store and then what they want?

    Steam already has a store on Android, you just can’t play games there because most games on steam either already exist on the native google play store, or aren’t compatible with mobile architectures like Arm64. Most mobiles unlike a arm laptop, have no x86/amd64 emulator which is what those games are compiled as by their developers.

    So what’s left?




  • Enterprise applications are often developed by the most “quick, ship this feature” form of developers on the world. Unless the client is paying for the development a quick look at the sql table shows often unsalted passwords in a table.

    I’ve seen this in construction, medical, recruitment and other industries.

    Until cyber security requires code auditing for handling and maintaining PII as law, mostly its a “you’re fine until you get breached” approach. Even things like ACSC Australia cyber security centre, has limited guidelines. Practically worthless. At most they suggest having MFA for Web facing services. Most cyber security insurers have something but it’s also practically self reported. No proof. So if someone gets breached because someone left everyone’s passwords in a table, largely unguarded, the world becomes a worse place and the list of user names and passwords on haveibeenpwned grows.

    Edit: if a client pays and therefore has control to determine things like code auditing and security auditing etc as well as saml etc etc, then it’s something else. But say in the construction industry I’ve seen the same garbage tier software used at 12 different companies, warts and all. The developer is semi local to Australia ignoring the offshore developers…




  • In my 20 years of outsource IT career I’ve helped lots of business moguls with their personal home mail servers, since I already support their business IT. This doesn’t mean it’s easy, it means they’ve got money to ask someone to do it.

    I’m going to tell you, it’s all nice and easy if you understand servers, backup, networking, dns, and security. If you don’t, you’ll probably get it working, for a while, until it doesn’t.

    Why do you pay IT if it’s already working? Why do you pay IT if it’s not working?




OSZAR »