What is the most secure hardware option for the use of personal eIDAS compliant QES in the EU?

I know that there are two approaches, one with local capsulated storage, such as USB token or smartcard, and the other with cloud-based key vault. Both are secured with a PIN that has to be entered in the client requesting authentication. … Continue reading What is the most secure hardware option for the use of personal eIDAS compliant QES in the EU?

Help understanding PKI MTLS and digital signature architecture

I’m building an identity service using PKI and MTLS for authentication where users are supposed to be able to sign data e.g. a json string or a document.
Where I am now
I have implemented working MTLS using AWS ACM PCA as Private CA and KM… Continue reading Help understanding PKI MTLS and digital signature architecture

Can/should a x509 client auth certificate be used to sign data?

I’m building an identity service and have successfully managed to implement MTLS authentication using x509 client certificates to identify the user.
However, we also want the user to be able to sign some data.
At the moment we’re signing t… Continue reading Can/should a x509 client auth certificate be used to sign data?

Do I need different certificates for MTLS and Signing data?

I’m building an identity service using PKI and MTLS for authentication.
I use AWS ACM PCA for private certificate authority and AWS KMS for key pairs. I use the private key created by KMS to sign the Certificate Signing Request that’s sent… Continue reading Do I need different certificates for MTLS and Signing data?

Is it possible for an app to sign data it generates so that the data can be guaranteed to come from the app? [duplicate]

Is it possible for an app binary to sign content generated by the app such that a verifier can confirm the data was indeed generated by a specific version of the app?
For example:
A mobile app from a trusted publisher generates a sequence … Continue reading Is it possible for an app to sign data it generates so that the data can be guaranteed to come from the app? [duplicate]

Why can’t MITM attacker steal SSL certificate and behave like a server before key exchange? [duplicate]

Before key exchange, since there is no encryption, an attacker can copy certificate section of http request and create a new http request with his own ip address. After that, attacker can create a secure communication with client. To preve… Continue reading Why can’t MITM attacker steal SSL certificate and behave like a server before key exchange? [duplicate]