EU Article 45 requires that browsers trust certificate authorities appointed by governments::The EU is poised to pass a sweeping new regulation, eIDAS 2.0. Buried deep in the text is Article 45, which returns us to the dark ages of 2011, when certificate authorities (CAs) could collaborate with governments to spy on encrypted traffic—and get away with it. Article 45 forbids browsers from…

    • @MeanEYE@lemmy.world
      link
      fedilink
      English
      342 years ago

      Personal ID cards have certificates on them issued by the government. These certificates can be used for anything from digitally signing documents to logging in to government web sites without having yet another user/pass. So far situations was a nightmare.

      Government provided tools and plugins for browsers to support logging in and signing, but it’s been a shitshow when it comes to support. Pretty much only Windows and only certain versions of it and even then it worked half of the time. You had to install certificate manually and trust, etc. Am assuming this is to make sure these services work but also so they can issue certificates for their own web sites.

      • @pastermil@sh.itjust.works
        link
        fedilink
        English
        192 years ago

        Personal digital certificate sounds like an awesome concept. Too bad the implementation seems so narrow-minded. Typical beaureaucrats.

        • @MeanEYE@lemmy.world
          link
          fedilink
          English
          62 years ago

          My country has half-assed implementation but in general it has been great. For any signing I can just shove my personal id, enter pin and document is cryptographically signed. No alteration possible. And since government is the issuer of the certificate, no one can fake it. We have our e-government thing also, where you can do a lot of things, from checking your kids grades in school to theoretically handling all of the documentation you might need. Personal id is used to login into that service. Shove a card, enter pin and you are there. No sign up, remember password, etc. I have even set up, at one point, login into my computer using my personal id, out of curiosity as it held no other benefit. Had to add that root certificate to my machine though.

          Sadly it all sounds great on paper, but execution is lacking. Some things still require pen and paper and it’s annoying, but we’ll get there. That’s why my assumption is governments wanting to push for easier integration. Then all you’d need was card reader and a browser. Which also the reason why I don’t think they are trying to push this idea for nefarious purposes. People download and install government software without thinking or double-checking all the time. Adding certificate through any installation wouldn’t be much of a challenge.

  • @Send_me_nude_girls@feddit.de
    link
    fedilink
    English
    922 years ago

    Great and in 2 -3 years we find out, that someone has actively abused this security hole for years and stole whatever master key is required, to create their own fake government CA and has been spying on everyone for years. Or political opposition was imprisoned before they could act. Best is, such man in the middle attacks allow for all sorts of things, including putting fake evidence on your computer.

    Oh yes, no one would ever do that every, totally never happened and won’t. Nazis will also never come back. What, they soon are the biggest party in Germany, in other countries too? And will dictate rules in the EU? No one could see that happening…

    Where there’s honey, there will be bears.

    I just hope we can create a browser plugin to deny gov CAs automatically or a browser from outside EU to block that shit. …until your ISP is forced by law to block traffic from these.

    One step closer to a great EU firewall and it sucks. Good old salami tactics. Because at some point it doesn’t even matter if there are ways to mitigate this spying, if the alternative are so complicated and uncomfortable to use, that 99,999% of the people won’t bother.

  • @DieguiTux8623@feddit.it
    link
    fedilink
    English
    442 years ago

    You know, they are not being autocratic, it’s for people’s own good, to protect children and other “random bullshit go!” things.

    Unless we act, we’re doomed. This is the new “nobles and clergymen”, only it’s “riches and beurocrats”.

  • @ShunkW@lemmy.world
    link
    fedilink
    English
    342 years ago

    What a fucking nightmare. And I thought the US was bad about trying to encroach more on privacy.

    • @MeanEYE@lemmy.world
      link
      fedilink
      English
      -32 years ago

      Am thinking this looks like a nightmare but their intentions are actually different. However giving any kind of power to government is almost universally bad idea since it’s guaranteed to be abused, no matter the initial reason it was added.

            • @MeanEYE@lemmy.world
              link
              fedilink
              English
              02 years ago

              Well, like I wrote in other comment of mine. Governments here issue personal certificates signed by government ones. These personal certificates can then be used to digitally sign documents and tax reports. It can be used to log into government web sites and many similar uses. These certificates that EU says browsers have to accept are the same ones everyone already uses for biometric passports. If browser accepted these root certificates, then things would be significantly easier to support. No software installation required.

              People seem to think this will be used for nefarious cases, but in reality people just install government issued software without thinking. Well, any software without thinking. During that installation you can already add certificate to browser and whole OS. It’s just easier and better supported if they go through public way instead of having to support multiple OS installations and similar issues.

              • @ShunkW@lemmy.world
                link
                fedilink
                English
                12 years ago

                Yeah that argument holds zero water. Forcing browsers to trust these roots means not only pre-trusting them, but disallowing removal of trust. This is completely intended for surveillance purposes.

                • @MeanEYE@lemmy.world
                  link
                  fedilink
                  English
                  02 years ago

                  Removal of trust happened many times in the past. And like I said, it’s not changing anything other than making things easier. You can still add certificates to the browser trusted list if you have access to the person’s computer, which when you install any software you do. Perhaps the best middle ground would be to add certificates but make them conditional that is to say ask the user what they want to do and offer multiple options. Trust for this domain only, trust always, just this time, don’t trust.

  • @uis@lemmy.world
    link
    fedilink
    English
    32 years ago

    Can we at least admit that requiring CAs is not how ecryption in Internet should work? Just FYI there is already distributed public key infrastructure: DNS(DNSSEC).

  • @daniskarma@lemmy.world
    link
    fedilink
    English
    02 years ago

    Seems great, if they achieve the same security standards as a private company I don’t see why we cannot have public CAs.