I think you might not be aware of it but big institutions like governments and such can basically already circumvent HTTPS encryption by supplying fake root certificates and forcing the ISP to redirect traffic through their own servers.
That is why End-to-End encryption is such a big deal. Because it cannot be circumvented by the government alone. If done right (proper key exchange), it cannot be broken by anyone but the legitimate recipients. The way WhatsApp does it today, Meta could technically break it too, though i’m not sure whether they do.
That’s not necessarily very easy. These certs would have to show up in public certificate transparancy logs for most browsers to accept them. If this happens on a government scale it would surely get noticed, though the question remains what you’re left to do if the government forces it anyways…
I think you might not be aware of it but big institutions like governments and such can basically already circumvent HTTPS encryption by supplying fake root certificates and forcing the ISP to redirect traffic through their own servers.
That is why End-to-End encryption is such a big deal. Because it cannot be circumvented by the government alone. If done right (proper key exchange), it cannot be broken by anyone but the legitimate recipients. The way WhatsApp does it today, Meta could technically break it too, though i’m not sure whether they do.
That’s not necessarily very easy. These certs would have to show up in public certificate transparancy logs for most browsers to accept them. If this happens on a government scale it would surely get noticed, though the question remains what you’re left to do if the government forces it anyways…
See https://en.m.wikipedia.org/wiki/Certificate_Transparency section “Mandatory certificate transparency”
admittedly, but i still assume that the CIA could do it if it tried.
edit: thanks for the link though, this seems very interesting :D