Getting a fake certificate signed requires state level opposition or entities with that level of resources
Yeah like I said, if they can hijack your traffic, they can easily get a fake cert signed.
Self-signed certs let Jimmy-Joe-Bob’s Rifle Range and Real Good Hacker Script Kiddie Ring fake you out in minutes.
How? They would have to steal the CA key and could only impersonate the site with the self signed cert. (At least if you don’t add it to your certificate store)
The cert is self-signed. There isby definition no CA key! Anybody accessing that sight, unless they did something phenomenally stupid, is going to have to validate access by self-signed cert on each access. And that means that any MitM isn’t going to flag any alarms … because they’d be inserting themselves as a self-signed cert.
Yeah like I said, if they can hijack your traffic, they can easily get a fake cert signed.
How? They would have to steal the CA key and could only impersonate the site with the self signed cert. (At least if you don’t add it to your certificate store)
The cert is self-signed. There is by definition no CA key! Anybody accessing that sight, unless they did something phenomenally stupid, is going to have to validate access by self-signed cert on each access. And that means that any MitM isn’t going to flag any alarms … because they’d be inserting themselves as a self-signed cert.
Sure, it’s even in the terminology you use self-signed. They used their own CA to sign the certificate.
The fingerprints are going to change and it will be signed by another CA. So MitM-attempts are pretty obvious.
Are you thick or are you trolling? (Serious question.)