Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

That's part of the point of certificate pinning.


sort by: page size:

How does that work with certificate pinning?

This is prevented by certificate pinning.

That might be because of certificate transparency rather than certificate pinning.

Certificate pinning would defeat this. Bake it into your app that you only trust a specific certificate regardless of what is in the system trust store.

Certificate pinning is inherently security by obscurity; it's intended as an annoyance for anyone trying to reverse-engineer the service, rather than an insurmountable barrier.

Can certificate pinning be defeated?

Certificate pinning is easy to defeat.

Certificate pinning is one of the most user-hostile security inventions we've created. It makes it so hard to get access to the traffic coming out of your own device, which heavens, seems like such an elementary ask.

Hm, do you know how? I'd guess certificate pinning, which would be rather prudent of them, but I'm not sure.

Certificate pinning helps, although it obviously doesn't prevent an attack against something you haven't seen before.

Certificate pinning is gaining popularity e?f?f?e?c?t?i?v?e?l?y? somewhat thwarting MITM attacks.

With certificate pinning, that is not a high risk.

I already addressed this in the very comment you were replying to, certificate pinning is very easy to defeat with public tools.

I don't think so. Certificate pinning protects from rouge CAs.

And this can be used to defeat certificate pinning?

There is not a solid consensus on cert pinning, and for good reason.

https://www.digicert.com/blog/certificate-pinning-what-is-ce...


Think there are a few tools for getting around the certificate pinning, projects like sensepost/objection

In security, certificate pinning is a good practice because it defends against, who guessed it, MITM.

Not if you control CAs. Cert pinning only works in a limited amount of cases, and certificate transparency only works with CAs who have agreed to implement them (Which is not the vast majority).
next

Legal | privacy