Explore global digital identity projects—from Aadhaar to Estonia’s eID—and uncover the lessons, risks, and opportunities shaping eGov worldwide. https://hackernoon.com/would-you-trust-your-government-with-your-digital-identity #publickeyinfrastructure
Would You Trust Your Government With Your Digital Identity? | HackerNoon

Explore global digital identity projects—from Aadhaar to Estonia’s eID—and uncover the lessons, risks, and opportunities shaping eGov worldwide.

Explore the evolution of PKI, from centralized certificate authorities to decentralized systems like SDSI, TOFU, IRMA, and Sovrin. https://hackernoon.com/a-timeline-of-public-key-infrastructure-what-worked-what-failed-and-whats-next #publickeyinfrastructure
A Timeline of Public Key Infrastructure: What Worked, What Failed, and What’s Next | HackerNoon

Explore the evolution of PKI, from centralized certificate authorities to decentralized systems like SDSI, TOFU, IRMA, and Sovrin.

PKI isn’t bulletproof. Explore the technical, legal, economic, and social risks behind digital certificates and public key infrastructures. https://hackernoon.com/why-public-key-infrastructure-isnt-the-silver-bullet-for-digital-security #publickeyinfrastructure
Why Public Key Infrastructure Isn’t the Silver Bullet for Digital Security | HackerNoon

PKI isn’t bulletproof. Explore the technical, legal, economic, and social risks behind digital certificates and public key infrastructures.

Europe is betting big on digital identity. But can decades-old PKI tech secure it, or will its flaws derail the EU’s digital future? https://hackernoon.com/53-years-of-public-key-infrastructure-and-its-still-broken #publickeyinfrastructure
53 Years of Public Key Infrastructure and It's Still Broken? | HackerNoon

Europe is betting big on digital identity. But can decades-old PKI tech secure it, or will its flaws derail the EU’s digital future?

Public Key Infrastructure Market Set to Multiply from $4.6 Billion in 2024 to $11.74 Billion by 2029, Fueled by Major Trends & Driven by Emergence of Cyber Frauds - Good PR News

What Does the Public Key Infrastructure Market Analysis Reveal About Its Size and Growth Rate? The public key infrastructure market size has grown exponentially in recent years. It is projected to swell from $4.6 billion in 2024 to $5.54 billion in 2025 showing a compound annual growth rate (CAGR) of 20.7%. The explosive growth during

Good PR News - Global Free Press Release Submissions Site

Just spent some quality time figuring out why HTTPS requests with incorrect system time would fail - even though the time was between the certificate NotBefore and NotAfter.

OCSP stapling was the culprit. This adds a more strict "window of system time validity" due to the way the protocol works. The obvious reason for the smallish window is to allow caching, while reducing the replay attack possibilities. Thus, the system clock can't be backdated more than a few hours, regardless of certificate NotBefore. The system time can be more off towards the future.

In our use case, we don't need to worry about revocation and hence we will just kill OCSP use. With this, we will still have the limits set by the certificate NotBefore and NotAfter, but at least they're more predictable and somewhat laxer.

#pki #publickeyinfrastructure #tls

A quick post on Chen’s algorithm

Update (April 19): Yilei Chen announced the discovery of a bug in the algorithm, which he does not know how to fix. This was independently discovered by Hongxun Wu and Thomas Vidick. At present, th…

A Few Thoughts on Cryptographic Engineering
Do current browsers still validate CRLs in enterprise PKI environments

I know that modern web browsers don't check CRLs for certificates from CAs in the default trust store anymore. I also know that there are some exceptions for certificate validation when it comes to

Information Security Stack Exchange
SSL/x509 certificate/public key expiration

I would like to know the process of how public keys/certificates are renewed for a website. I understand the concept of CA (Certificate Authority) chains, and how the public key/certificate for a s...

Information Security Stack Exchange
Over what fields is the X509 hash computed over?

Is this how X509 certificates are verified to be valid? The receiver receives the certificate Look at the issuer of the cert, and find the public key of that CA (its hardcoded in the application o...

Information Security Stack Exchange