privacy

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

4am, in Chrome not proceeding with Web Integrity API deemed by many to be DRM

They are doing a version of it for video players, actually.

You know, so you can’t watch YouTube on alternate clients.

quantenzitrone, in FOSS Firefox Dark Theme Extension?

“Dark Background and Light Text” is much faster than Dark Reader.

shapis,
@shapis@lemmy.ml avatar

Faster in what sense? Doesnt seem to me as if dark reader makes things any slower.

ultratiem, in What can we do about major sites blocking VPN providers?
@ultratiem@lemmy.ca avatar

You can’t hide behind a VPN and access the entirety of the net. There will always be some site that will block you. It’s just par for the course. Unwinnable battle.

ultratiem, in Mullvad Convert Encrypted DNS Servers To Run From RAM
@ultratiem@lemmy.ca avatar

They have been trying to make this a thing for a while now. Glad they are finally near the finish line!

And if anyone had doubts about their no-log policies. These guys are just great!

opensourcedeeznuts,

I just bought in to mulvad today via Tailscale, so far so good, I like it!

ultratiem,
@ultratiem@lemmy.ca avatar

I love the entire process. I love that I can send them cash in an envelope with an account number on it and they’ll just top it up lol. I wish every online retailer had to do what they voluntarily do.

ReversalHatchery, in Article 45 Will Roll Back Web Security by 12 Years

As I understand the article says the article was finalized on November 8, 2 days ago. Do we know what was the outcome?

jimmydoreisalefty, in Mullvad Convert Encrypted DNS Servers To Run From RAM
sadreality, in What can we do about major sites blocking VPN providers?

The real solution is to avoid these sites when possible

But this practice tells you what we all needed to know... They won't serve u unless they can track you.

Vote with us feet cattle

possiblylinux127, in windows and privacy

Honestly blackout blinds will be fine but the real answer is to just to not do anything in your windows you don’t want seen. I personally want sunlight so for me its just a matter of making sure no one else is peering into my windows. Luckily that isn’t culturally accepted

Treczoks, in Meta payment message

The sane choice would be to leave.

Anticorp, in Meta payment message

I chose option C, don’t use Instagram. But thanks, I guess!

yoz, in Meta payment message

FOSS alternative is PixelFed

PowerCrazy, in Article 45 Will Roll Back Web Security by 12 Years

Centralized CAs were and are a mistake. HTTPs should work more like ssh-keys where the first time you connect to a website it’s untrusted, but once you have validated it the website you want, it never bothers you again unless the private key changes. Private key rotations can be posted on public forums, or emailed, or any number of other ways and users that don’t care can ignore the warnings like they do anyway, while users who DO care, can perform their own validation through other channels.

The most important aspect is that there is no “authority” that can be corrupted, except for the service you are connecting to.

CrinterScaked,

There is no way a user can know the website is real the first time it’s visited, without it presenting a verifiable certificate. It would be disastrous to trust the site after the first time you connected. Users shouldn’t need to care about security to get the benefits of it. It should just be seamless.

There are proposals out there to do away with the CAs (Decentralized PKI), but they require adoption by Web clients. Meanwhile, the Web clients (chrome) are often owned by the same companies that own the Certificate Authorities, so there’s no real incentive for them to build and adopt technology that would kill their $100+ million CA industry.

PowerCrazy,

There is no way a user can know that their traffic hasn’t been man-in-the-middled by a compromised CA either. And why is it “disastrous” to trust a website after you have cryptographically verified its the same website you visited before? It would present the same public/private key pair that you already trust.

CrinterScaked,

Where does the initial cryptographic verification come from? I’m not arguing that you can’t pin certificates.

PowerCrazy,

That’s where the SSH analogy comes from. On the initial connection you get the signature of the web-site you are trying to visit and your browser trusts it from then on. If something changes later, then the scary warning comes up.

jasondj,

Yeah, except you aren’t supposed to TOFU.

Literally everybody does SSH wrong. The point of host keys is to exchange them out-of-band so you know you have the right host on the first connection.

And guess what certificates are.

Also keep in mind that although MS and Apple both publish trusted root lists, Mozilla is also one of, if not the, biggest player. They maintain the list of what ultimately gets distributed as ca-certificates in pretty much every Linux distro. It’s also the source of the Python certifi trusted root bundle, that required by requests, and probably makes its way into every API script/bot/tool using Python (which is probably most of them).

And there’s literally nothing stopping you from curating your own bundle or asking people to install your cert. And that takes care of the issue of TOFU. The idea being that somebody that accepts your certificate trusts you to verify that any entity using a certificate you attach your name to was properly vetted by you or your agents.

You are also welcome to submit your CA to Mozilla for consideration on including it on their master list. They are very transparent about the process.

Hell, there’s also nothing stopping you from rolling a CA and using certificates for host and client verification on SSH. Thats actually preferable at-scale.

A lot of major companies also use their own internal CA and bundle their own trusted root into their app or hardware (Sony does this with PlayStation, Amazon does this a lot of AWS Apps like workspaces, etc)

In fact, what you are essentially suggesting is functionally the exact same thibg as self-signed certificates. And there’s absolutely (technically) nothing wrong with them. They are perfectly fine, and probably preferable for certain applications (like machine-to-machine communication or a closed environment) because they expire much longer than the 1yr max you can get from most public CAs. But you still aren’t supposed to TOFU them. That smacks right in the face of a zero-trust philosophy.

The whole point of certificates is to make up for the issue of TOFU by you instead agreeing that you trust whoever maintains your root store, which is ultimately going to be either your OS or App developer. If you trust them to maintain your OS or essential app, then you should also trust them to maintain a list of companies they trust to properly vet their clientele.

And that whole process is probably the number one most perfect example of properly working, applied, capitalism. The top-level CAs are literally selling honesty. Fucking that up has huge business ramifications.

Not to mention, if you don’t trust Bob’s House of Certificate’s, there’s no reason you can’t entrust it from your system. And if you trust Jimbo’s Certificate Authority, you are welcome to tell your system to accept certificates they issue.

ReversalHatchery,

Yeah, except you aren’t supposed to TOFU.

A better solution would be to have both at the same time.
Browser says: x number of CAs say that this site is authentic (click here for a list). Do you trust this site? Certificate fingerprint: … Certificate randomart: …

And then there would be options to trust it once, trust it temporarily, trust it and save the cert. The first 2 could also block JS if wanted.

I can see this would annoy the mainstream users, so probably this should be opt-in, asked at browser installation or something like that.

jasondj,

But you only really need one to say it’s authentic. There are levels of validation that require different levels of effort. Domain Validation (DV) is the most simple and requires that you prove you own the domain, which means making a special domain record for them to validate (usually a long string that they provide over their HTTPS site), or by sending an email to the registered domain owner from their WHOIS record. Organization Validation (OV) and extended verification (EV) are the higher tiers, and usually require proof of business ownership and an in-person interview, respectively.

Now, if you want to know if the site was compromised or malicious, that’s a different problem entirely. Certificates do not and cannot serve that function, and it’s wrong to place that role on CAs. That is a security and threat mitigation problem and is better solved by client-based applications, web filtering services, and next-gen firewalls, that use their own reputation databases for that.

A CA is not expected to prevent me from hosting rootkits. Doesn’t matter if my domain is rootkits-are.us or totallylegitandsafe.net. It’s their job to make sure I own those domains. Nothing more. For a DV cert at least.

Public key cryptography, and certificates in particular, are an amazing system. They don’t need to be scrapped because there’s a ton of misunderstanding as to its role and responsibilities.

shekau, in In what world does a VPN need access to Camera and Bluetooth?

My eyes… ouch

doctorn, in Meta payment message
@doctorn@r.nf avatar

Should have posted that chain-text to my Facebook wall years ago so my profile would be blue and safe…

Please forgive me,… I failed you all… 😭

https://r.nf/pictrs/image/221dd393-7f66-4177-b0b7-1a98202e3a4e.jpeg

RickyRigatoni,
@RickyRigatoni@lemmy.ml avatar

I swear these specific copypastas are started by grad school sociology students for their thesis research or something.

leraje, in Meta payment message
@leraje@lemmy.blahaj.zone avatar

“Your info won’t be used for ads”

But we’ll still be tracking everything you do and selling that on to everyone who wants it.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacy@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #