Let's Encrypt, pls, don't let us down, I can't go back to painful reissuance of certificates through digital equivalent of 18th century english bank.

Also, I don't want to get a heart attack due to me working in infosec and suddenly remembering worst case scenarios, including what Vernor Vinge described in Rainbow's End.

#infosec #certificates
Let's Encrypt Status

Support for Let's Encrypt services is community-based and information on current status and outages can be found at: https://community.letsencrypt.org

Secure Boot Certificate in QEMU Ubuntu 24.04 for Windows Guest #virtualization #qemu #secureboot #certificates

https://askubuntu.com/q/1566505/612

Secure Boot Certificate in QEMU Ubuntu 24.04 for Windows Guest

I have a computer running Ubuntu 24.04 LTS desktop where I have QEMU/KVM running. One of the guest OS is Windows 11. This VM has secure-boot on as required by Windows. The secure boot certificates

Ask Ubuntu

If your looking for lower cost code signing certificate for an open source project then Certium has options:

https://www.certum.eu/en/

€69 for the first year, which apparently includes a USB device to house the certificate hardware, renewals is a lot less.

Seems like a good option, although I've not tried this personally 🙂🤷‍♂️

#AppDevelopment #OpenSource #Certificates #DigitalCertificates #CodeSigning

SSL Certificates, Electronic Signature, Code Signing: Certum

Certum Certification Authority offers you solutions such as e-Signature, Electronic Seal, SSL Certificate or S/MIME Certificate.

Certum
Revocation of X.509 certificates | APNIC Blog

'Revocation is broken' is a catchphrase in the world of certificates and Certificate Authorities. Certification infrastructure may not have been designed for the Internet of today.

APNIC Blog
If your web browser has to authenticate web sites it connects to, why can't your phone authenticate cellular towers it connects to? Can't this be baked into the protocol?
https://www.theglobeandmail.com/business/article-toronto-police-charge-three-in-sms-blaster-scam-text-operation/
#sms #infosec #cybersecurity #toronto #Canada #cybercrime #smsblasters #certificates
Toronto police charge three in ‘SMS Blaster’ scam-text operation

Police say it’s the first time the portable devices used to mimic cellphone towers have been detected in Canada

The Globe and Mail

How to regenerate sendmail certifcates #certificates #sendmail #tls

https://askubuntu.com/q/1565815/612

How to regenerate sendmail certifcates

I have recently reconfigured my sendmail for TLS. As part of the validation I have used checktls.com which throws up a few issues. The first concerns a certificate failure which I have been advised...

Ask Ubuntu
How to regenerate sendmail certifcates

I have recently reconfigured my sendmail for TLS. As part of the validation I have used checktls.com which throws up a few issues. The first concerns a certificate failure which I have been advised...

Ask Ubuntu

I'm now removing #HestiaCP from the #server 🤬

#letsencrypt #certificates for the mail domain keep failing to renew automatically. Getting a new certificate for the affected domains is always a nightmare.

I only notice the error when my email programs report an expired certificate. I've been desperately trying to renew two expired certificates for the past hour, but the requests keep getting rejected.

Firstly, this is beyond my capabilities, and secondly, I had better things to do today. I'll try #ISPconfig again.

PKI in a Nutshell
A blog by Ronald

This blog briefly describes theoretically how Public Key Infrastructure (PKI) works. It also introduces the key concepts used in PKI. This is done by describing encryption, decryption, hashing, signing, and authentication using mathematical notations.

#dev #softwaredevelopment #Security #PKI #PublicKeyInfrastructure #Certificates #PublicKey #PrivateKey #Keystore #Truststore

https://jdriven.com/blog/2026/04/PKI-in-a-Nutshell/

PKI in a Nutshell

This blog briefly describes theoretically how Public Key Infrastructure (PKI) works. It also introduces the key concepts used in PKI. This is done by describing encryption, decryption, hashing, signin

JDriven Blog