No, that was different. eIDAS is certificate based - those that care will just use a VPN to download a non-EU compliant browser build and only surf with the VPN on. At least that’s my plan.
It would force the inclusion of a “trusted root” into browsers & OSs with the purpose of allowing government entities to spoof certificates. As certificate pinning is becoming mainstream, I would assume it’ll require browser & app vendors to weaken those controls too.
You’d hope ECHR’s prior ruling would block this too. For the exact same rationale.
No… That’s spyware with less steps… Theres no cracking, hacking, Trojans etc. involved at all, it’s a direct and straightforward addition of the spyware under color of the states authority.
No, that was different. eIDAS is certificate based - those that care will just use a VPN to download a non-EU compliant browser build and only surf with the VPN on. At least that’s my plan.
deleted by creator
But it’s not spyware. The eIDAS law proposes that governments can insert certificates that spoof the originator. A subtle difference.
I really hope Mozilla don’t comply
Still weakening encryption standards.
It would force the inclusion of a “trusted root” into browsers & OSs with the purpose of allowing government entities to spoof certificates. As certificate pinning is becoming mainstream, I would assume it’ll require browser & app vendors to weaken those controls too.
You’d hope ECHR’s prior ruling would block this too. For the exact same rationale.
deleted by creator
No… That’s spyware with less steps… Theres no cracking, hacking, Trojans etc. involved at all, it’s a direct and straightforward addition of the spyware under color of the states authority.
What would be a non-EU compliant browser?
I’m expecting browser companies to offer EU citizens a browser with the eIDAS cert acceptance baked in but outside the EU as they are now
Oh dear, I hope no one decides to offer a docker container that creates Firefox builds and takes a switch that turns that behaviour on and off.