The 2011 DigiNotar breach changed the way browsers do security. In this episode, we learn what role a CA plays, how browsers work with CAs, and what happens when a CA is breached.
Music in this episode: “The Loss of Blood” by Ian Alex Mac, “Blood Loss” by Ian Alex Mac. “Inspired”, “Dark Fog”, “The Snow Queen”, and “The Path of the Goblin King”, “Ghost Story”, “Metaphysik”, “Prelude in C”, “Ossuary 2”, “Master Disorder”, “Unanswered Questions”, and “Walking the Wall” by Kevin MacLeod Licensed under Creative Commons: By Attribution 3.0 License.
Add this episode of Darknet Diaries to your own website with the following embed code:
<iframe frameborder="0" height="200" scrolling="no" src="https://playlist.megaphone.fm?e=ADV5119980399" width="100%"></iframe>
JACK: A guy in Iran goes to check his e-mail. He types in gmail.com into his browser and hits enter. A strange warning pops up. It says Invalid Server Certificate. He’s unable to get to Gmail. He connects to a VPN and tries again. Through the VPN he connects just fine. He thinks there may be some funny business going on. He posts a question to the Google forums asking if there’s a possible man-in-the-middle attack going on. He also says he suspects his ISP or the Iranian government to be doing something fishy. Google responded not only to the forum post but they published a security warning to the world and released an emergency patch to their Chrome browser. Mozilla, Microsoft, and Apple followed quickly with similar security updates. There was, in fact, a man-in-the-middle attack against Gmail users; an attack which undermined the security in all browsers, an attack that had devastating consequences.