this post was submitted on 10 Nov 2023
519 points (98.9% liked)
Technology
60076 readers
3354 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Maybe I misunderstand what you're saying, but since the wide majority of EU citizens use their ISP's DNS, it's trivial for them to mandate a domain redirection to another server which would act as a proxy of the original (and thus only need the original server's public key).
So far, the only protection we have against that are:
That's why, to my understanding, this is such a big deal. At any point, ANY EU gov (and I want to emphasis that part because ot's important in the context of tjhs law) can request a change of DNS from their ISP's DNS (many already do right now) and emit a fully trusted certificate for the domain they want to MITM.
It is also a huge deal because since (at least in France) the government forced ISPs to log DNS queries, a lot of browsers (and latest android and iOSversion's) have now migrated to DNS over https or TLS DNS, which means that the only clear text DNS query they can intercept is the one to fetch your secure DNS service address. Now, having a trusted CA installed in browsers means that they can also spoof the identity of this secure name service, and regain a bit of control.
They invested a lot in surveillance technology (for both good and bad reasons), and https, DNS and encrypted messaging / phone calls means this was all for nothing.
And yes, by being authorized as a trusted CA, you can effectively spoof pretty much anything by setting a proxy. Some tools even leverage this for app analysis. Look up mitmproxy for example, or squid. A lot of companies already do this to inspect inbound / outbound traffic.