← Back to context

Comment by Galanwe

4 hours ago

Because there is a quadrillion trusted CAs in every device you might use. A good chunk of these CAs have been compromised at one point or another, and rogue certificates are sold in the dark market. Also any goverment can coerce a domiciled CA to issue certs for their needs.

That is a wild claim. I can't imagine that being correct given how that's been abused in the past

https://www.eff.org/deeplinks/2011/08/iranian-man-middle-att...

  • > That is a wild claim

    China telecom regularly has BGP announcements that conflict with level3's ASNs.

    Just as a hint in case you want to dig more into the topic, RIR data is publicly available, so you can verify yourself who the offenders are.

    Also check out the Geedge leaked source code, which also implements TLS overrides and inspection on a country scale. A lot of countries are customers of Geedge's tech stack, especially in the Middle East.

    Just sayin' it's more common than you're willing to acknowledge.

If you go down this path you argue desktop browsing https is broken, which i dont think is a serious argument.