Post Abq9BTFbbc4jCy26pU by rtp_tips@tube.tchncs.de
(DIR) More posts by rtp_tips@tube.tchncs.de
(DIR) Post #AbS1SaMjgerN8PWaZc by rtp_tips@tube.tchncs.de
2023-11-04T03:58:46.008Z
0 likes, 2 repeats
Time Is Running Out: European Union’s (Digital ID) eIDAS Wants Browsers To Require Gov Approved root Certificates, Under Premise Of Increasing Security — Where It In Fact Adds Yet Another Party, Gaining Ability To MiTM Break HTTPS / TLS Encryption — Revealing Passwords, Browsing, All In PlaintextAnytime you visit an https encrypted website, you are depending on the installed root cert trust to verify the encryption is in fact secure. When there is an issue with a certificate, from expired, to potentially malicious, your browser will try to warn you — UNLESS you have malicious root cert installed prior to visiting.This also relates to a study facebook performed, requiring young people to install their root cert to observe browsing / history of userseIDAS Is The EU Digital ID Reform. Today We Focus On The HTTPS Cert Aspect As Time Is Running Out To Push Back Against This ReformWe’ve seen similar actions by the Russian & Chinese governments… And the history for breaking https / TLS is there… As my previous content covers:Previously Covered Trustcor, And The Controveries Surrounding Their Defense / Law Enforcement Contracts For Breaking HTTPS By Installing root Certificate Trust In Browsers. It Takes Funding & Some Level Of Trust To Become A root certificate Authority… Watch that video here: https://youtu.be/TcYQCzhdEucOne solution mentioned in today’s video is taking advantage of end-to-end encryption. Even with end-to-end encryption, you should be mindful before accepting new keys, and always check the fingerprint.A more simple solution is utilizing Tor / I2P / lokinet hidden services - which bake end-to-end encryption directly in the hidden service protocol, bypassing the need for browser validation of encryption, and handling such directly “end to end”, from Tor / I2p router client, to the destination Tor / I2P client.SHARE IN THE COMMENTSJoin me today in this. Leave a comment, share a thought. EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)Watch, And Share With Others!I create independent content to keep you informed, share unique tips (many, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics. If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, more viewers leads to more time to new content)💎 CONSIDER SUPPORTING THIS CHANNEL (Thank You)💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNMCASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 PUBLIC BLOG: https://bmc.link/politictech/postsFirst shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)#https #eIDAS #cyber
(DIR) Post #AbpGfkds0xhWM4oCI4 by poise_shallow470@mastodon.social
2023-11-15T09:07:30Z
0 likes, 0 repeats
@rtp_tips Great videos, always looking forward to the next one.
(DIR) Post #Abq9BTFbbc4jCy26pU by rtp_tips@tube.tchncs.de
2023-11-15T19:18:23.815Z
0 likes, 0 repeats
@poise_shallow470@mastodon.social Thank you! I appreciate that. :) About to put another up.