• Re: tailscale ..impressiv

    From paulie420@VERT/BEERS20 to Phigan on Saturday, June 03, 2023 05:40:00
    Sounds pretty cool, but any time you're involving another party into the mix, there's always a chance they can evesdrop on you. Sure, they _say_ end to end encryption etc etc, but there's nothing stopping them from having a master key to all that encryption.

    Theres a self-hosted soltion. (Multiple, actually...)

    Headscale, Zero-Tier, can't think of the other one ATM. :P All great OSS options that create the same tunnels as tailscale.



    |07p|15AULIE|1142|07o
    |08.........
  • From fusion@VERT/CFBBS to Phigan on Monday, June 05, 2023 05:14:00
    On 04 Jun 2023, Phigan said the following...

    systems and browsers, the ones we trust. It's technically possible for
    any of them to have master keys to the certificates they generate and sign, but as the response in the link says, it's highly unlikely they would go using those willy nilly.

    no, that is not the case at all.

    you send a CSR and the public key to the CA. that's it. there is no "master key". the CA's only purpose and capability is to validate the owner of a public key. they are incapable of decrypting anything.

    now, lets say the kitchensync.net bbs has a certificate/public/private key they use. i can encrypt stuff all day long with the public key (in the
    certificate) and nobody but that bbs would ever be able to see it. remember the CA doesn't have the private key.

    now, if a shitty CA decides to sign a certificate for kitchensync.net with a different public key, that's an entirely different thing. since suddenly someone else can pretend to be them, and they have a separate private key that can decrypt data encrypted with the fake certificate. but in no way does this mean that the real certificate or private key are no longer secure. you
    can't decrypt stuff from the original with the new ones.

    --- Mystic BBS v1.12 A47 2021/12/25 (Windows/32)
    * Origin: cold fusion - cfbbs.net - grand rapids, mi
  • From Phigan@VERT/TACOPRON to fusion on Monday, June 05, 2023 11:19:00
    Re: Re: tailscale ..impressive
    By: fusion to Phigan on Mon Jun 05 2023 05:14 am

    you send a CSR and the public key to the CA. that's it. there is no "master key". the CA's only purpose and capability is to validate the owner of a public key. they are incapable of decrypting anything.

    That's when you're the one generating the cert request. What if some application or service is doing it for you? My point is more for messaging and other communication apps that tout "end to end encryption" vs SSL used for HTTPS.

    ---
    þ Synchronet þ TIRED of waiting 2 hours for a taco? GO TO TACOPRONTO.bbs.io