EFF warns of a weak link threatening security, possible surveillance and eavesdropping by untrustworthy certificate authorities. When you navigate to a banking or e-commerce site, the little padlock displayed on your browser should mean the website is HTTPS-encrypted and secure. Many sites rely on a third-party certificate authority (CA) to issue a SSL certificate that guarantees the site is authentic. There are hundreds of third party CAs that issue these certificates, and those companies, in turn, appoint others to issue certificates. There are now so many CAs, security researchers warn it’s becoming difficult to trust that a CA who issued the certificate is not misusing it to eavesdrop on users’ online activities.The Electronic Frontier Foundation (EFF) mapped more than 650 organizations that can issue certificates which will be accepted, directly or indirectly, by Microsoft’s Internet Explorer and Mozilla’s Firefox. The EFF will soon launch the SSL Observatory Project, “an effort to monitor and secure the cryptographic infrastructure of the World Wide Web. There is much work to be done, and we will need the help of many parties to make the HTTPS-encrypted web genuinely trustworthy… Browsers trust a very large number of these CAs, and unfortunately, the security of HTTPS is only as strong as the practices of the least trustworthy/competent CA.”Some of those CAs are signing unqualified names that are meaningless to assert ownership. The EFF and researchers saw over 6,000 unique valid “localhost” certificates from different issuers like Comodo, Go Daddy, GlobalSign, Starfield, Equifax, Digicert, Entrust, Cybertrust, Microsoft, and Verisign. The research also revealed some interesting subordinate CAs like the Department of Homeland Security (DHS) and Etisalat (Emirates Telecommunications Corporation). Peter Eckersley, a senior staff technologist at EFF, signed an open letter to Verizon which issued Etisalat’s power to certify Web sites. The EFF is asking Verizon to consider revoking that authority, since Etisalat may be an “unacceptable security risk to the Internet in general and especially to foreigners who use Etisalat’s data services when they travel.”Here is a part of EFF’s open letter about the problem with Etisalat. As you are aware, Etisalat is a telecommunications company headquartered in the United Arab Emirates. In July 2009, Etisalat issued a mislabeled firmware update to approximately 100,000 of its BlackBerry subscribers that contained malicious surveillance software. Research In Motion subsequently issued patches to remove this malicious code.More recently, the United Arab Emirates Telecommunications Regulatory Authority and Etisalat threatened to discontinue service to BlackBerry users, claiming that these devices “allow users to act without any legal accountability, causing judicial, social and national security concerns for the UAE”, apparently on account of Research In Motion’s refusal to offer surveillance back doors in its encryption services.These events clearly demonstrate that Etisalat and the UAE regulatory environment within which it operates are institutionally hostile to the existence and use of secure cryptosystems… Etisalat could use this key to issue itself valid HTTPS certificates for verizon.com, eff.org, google.com, microsoft.com, or indeed any other website. Etisalat could use those certificates to conduct virtually undetectable surveillance and attacks against those sites. Etisalat’s keys could also possibly be used to obtain access to some corporate VPNs.Now we wait for Verizon to answer or to act. Meanwhile, the SSL Observatory prepares to launch. EFF presented this topic at DefCon 18. Here is the slide deck which shows their presentation. Research of the SSL Observatory project was a collaboration between EFF and Jesse Burns at iSEC Partners. Like this? Check out these other posts: All of today’s Microsoft news and blogs Will Future Virtual Intelligence & Precrime Predictions Kill Privacy? Marketing Gone Wild: One Product Helps You Stalk, One Stalks You Rogue Security Researchers vs Microsoft: Karma Is Brutal! Verizon’s 2010 DBIR: Rise in Misuse, Malware and Social Engineering The Next Big Privacy Concern: RFID “Spychips” Certified Lies: Big Brother In Your Browser Privacy Wars: How to Hide While Google is Watching You EFF Fights To Allow People To Comment Anonymously Online Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe