logoalt Hacker News

nisegamilast Thursday at 12:50 PM2 repliesview on HN

>Btw. The https communication comparison does not hold, there is always a third party that can read what you say. E2E chats are effectively communication where evidence is instantly destroyed.

If I use a third party CA this is correct. But what third party can read communications over HTTPS between a client and a server I control with a self signed SSL cert?


Replies

sgtrxlast Thursday at 3:17 PM

This isn't correct with 3rd party CA's with modern TLS either.

TLSv1.2 has Perfect Forward Secrecy with DHE and ECDHE key exchanges and in TLSv1.3 PFS is mandatory. A compromised root CA or even leaf certificate these days protects you from a man-in-the-middle and not a whole lot else - the certificate private key is never used for session key derivation and the keys themselves are ephemeral and never sent over the wire so even intercepting the key exchange doesn't allow decryption of the stream.

show 1 reply
oasisaimlesslylast Thursday at 3:13 PM

Not even correct for a third party CA (unless they MITM you).