| ▲ | r4indeer 5 hours ago | ||||||||||||||||||||||||||||||||||||||||||||||
The argument regarding no certificate pinning seems to miss that just because I might be on a network that MITM's TLS traffic doesn't mean my device trusts the random CA used by the proxy. I'd just get a TLS error, right? | |||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | subscribed 3 hours ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||||||||
Not if someone can issue the certificate signed by the CA your phone trust. Imagine being in a cafe nearby, say, embassy of the certain north African country known for pervasive and wide espionage actions, which decides to hijack traffic in this cafe. Or imagine living in the country where almost all of the cabinet is literally (officially) being paid by the propaganda/lobbying body of such country. Or living int he country where lawful surveillance can happen without the jury signoff, but at a while of any police officer. Maybe its not common but frequent enough. | |||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | thegagne 5 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||||||||
Not if you are part of an org that uses MDM and pushes their own CA to devices. | |||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||