this post was submitted on 14 Jun 2025
568 points (97.7% liked)

Greentext

6498 readers
856 users here now

This is a place to share greentexts and witness the confounding life of Anon. If you're new to the Greentext community, think of it as a sort of zoo with Anon as the main attraction.

Be warned:

If you find yourself getting angry (or god forbid, agreeing) with something Anon has said, you might be doing it wrong.

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[โ€“] Rossphorus@lemmy.world 1 points 10 hours ago (1 children)

As with everything, trust is required eventually. It's more about reducing the amount of trust required than removing it entirely. It's the same with HTTPS - website certificates only work if you trust the root certificate authorities, for example. Root manufacturer keys may only be certified if they have passed some level of trust with the root authority/authorities. Proving that trust is well-founded is more a physical issue than an algorithmic one. As it is with root CAs it may involve physical cybersecurity audits, etc.

[โ€“] Valmond@lemmy.world 1 points 27 minutes ago

Yep, totally fair. It's kind of crazy actually how we all trust that stuff, and when there's a breach people just want to expire certificates more often etc.

I bet there is a better way but as long as no one is paying, we're stuck with this mess. I have programmed stuff with x509 in the medical sector, what a trusty spaghetti mess that was, but when you finally got your cert, you could basically do whatever.

Sorry for the rant ๐Ÿ˜… I just want to show people that even if the mathematics behind RSA is fantastic and secure, the human side is always there to break that ๐Ÿคท๐Ÿผโ€โ™€๏ธ.