A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
- Don’t promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
- 0 users online
- 113 users / day
- 519 users / week
- 1.44K users / month
- 4.49K users / 6 months
- 1 subscriber
- 4.27K Posts
- 108K Comments
- Modlog
Well that’s not strictly true. If you run Windows, you already have a root certificate installed on your computer from the government of Saudi Arabia (sha1 fingerprint 8351509B7DF8CFE87BAE62AEB9B03A52F4E62C79).
The purposes don’t include code signing, so they probably can’t use it directly for malware. But it includes server identification, so they could possibly intercept your traffic and resume https with their own cert (which hopefully your browser would flag, but isn’t guaranteed). That would allow them to serve malware.
An easy way to get access to your traffic is bgp hijacking: https://en.wikipedia.org/wiki/BGP_hijacking