this post was submitted on 08 Mar 2024
332 points (97.4% liked)
Europe
8324 readers
1 users here now
News/Interesting Stories/Beautiful Pictures from Europe πͺπΊ
(Current banner: Thunder mountain, Germany, π©πͺ ) Feel free to post submissions for banner pictures
Rules
(This list is obviously incomplete, but it will get expanded when necessary)
- Be nice to each other (e.g. No direct insults against each other);
- No racism, antisemitism, dehumanisation of minorities or glorification of National Socialism allowed;
- No posts linking to mis-information funded by foreign states or billionaires.
Also check out [email protected]
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Yes, in that case, it most likely was using an insecure channel to directly dial into the conference. Still, the entire certificate infrastructure is mere security theater, unless you're actually going through the trouble of checking every individual certificate yourself.
Thatβs the open secret of the Web, all security on it is just fake. The list of root certificates is way too long to provide any security.
Think itβs likely to impact people with regular threat models?
Any obvious solutions?
Certificate transparency, pinning, etc
Public WiFi is the main problem, anybody connected to the same WiFi could potentially intercept all of your Web traffic. You could use a VPN to avoid that one.