2
submitted 10 months ago by spottyPotty@alien.top to c/main@selfhosted.forum

Regardless of whether or not you provide your own SSL certificates, cloudflare still uses their own between their servers and client browsers. So any SSL encrypted traffic is unencrypted at their end before being re-encrypted with your certificate. How can such an entity be trusted?

you are viewing a single comment's thread
view the rest of the comments
[-] spottyPotty@alien.top 1 points 10 months ago

Good point. Who's to say that LetsEncrypt doesn't keep a copy of my private keys?

[-] capecodcarl@alien.top 3 points 10 months ago

A certificate authority doesn't have a copy of your private key, you send them a certificate signing request. The private key never leaves your system. That's the whole point of public key encryption.

[-] spottyPotty@alien.top 0 points 10 months ago

Then trusting root CAs is a non-issue?

[-] kring1@alien.top 1 points 10 months ago

It is, but for a different issue.

Every CA you trust can create certificates for every site. If you trust the e.g. NSA CA, they can create a certificate for gmail.com and put a MITM between you and gmail.

The EU is planning to force browsers to add their backdoor CA

load more comments (5 replies)
load more comments (5 replies)
load more comments (6 replies)
this post was submitted on 20 Nov 2023
2 points (100.0% liked)

Self-Hosted Main

502 readers
1 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

For Example

We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.

Useful Lists

founded 1 year ago
MODERATORS