Archived version: https://archive.ph/nH73q
Archived version: https://web.archive.org/web/20231108114207/https://www.theregister.com/2023/11/08/europe_eidas_browser/
You must log in or # to comment.
But one of the requirements of eIDAS 2.0 is that browser makers trust government-approved Certificate Authorities (CA) and do not implement security controls beyond those specified by the European Telecommunications Standards Institute (ETSI).
State-mandated backdoors seem bad
I’m kinda disappointed this is happening again. Certificate authorities just say “this person is who they say they are”. They can’t reroute traffic, trick you into connecting to the wrong ip, or decrypt traffic
deleted by creator