Hacker News new | past | comments | ask | show | jobs | submit login

If you're building an interception service (which this could be) - then yes, you build your own Root CA which you install on devices that you want to intercept.

Legitimate uses of this would be things like government or military departments intercepting traffic from their own network.

As explained elsewhere in this thread, they have a history of working with regimes where they want to intercept the traffic of the general public in countries.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: