How do I remove a certificate from (RedHat) Linux ca-trust? [migrated]

I installed a duplicate certificate for a CN in the ca-trust store of my RHEL8 systems. I added the PEM file to /etc/pki/ca-trust/source/anchors and ran update-ca-trust.
How can I remove the certificate(s) that update-ca-trust installed? I… Continue reading How do I remove a certificate from (RedHat) Linux ca-trust? [migrated]

Is Digital Signature really necessary for an open system considered by FDA’s 21 CFR Part 11?

21 CFR Part 11’s Subpart B for Electronic Records has a section on ‘Controls for Open Systems" stating that:

Persons who use open systems to create, modify, maintain, or transmit
electronic records shall employ procedures and control… Continue reading Is Digital Signature really necessary for an open system considered by FDA’s 21 CFR Part 11?

How to Capture Mobile API Requests in burp when Server side pinning is implemented

I recently encountered a scenario where Mobile Application is generating CSR request, call a POST API request and in response, Ask Server for certificate. Server will respond with the temporary certificate and Mobile Application will use t… Continue reading How to Capture Mobile API Requests in burp when Server side pinning is implemented

multiple machines sync without single point of failure

I use various Linux machines where I like to sync some config and other important files. This is a security risk, as an intruder on one machine could easily modify some script that would be propagated to the other machines automatically.
T… Continue reading multiple machines sync without single point of failure

Is hashing a digital signature for quick (but incomplete) validation a known and/or acceptable practice?

Let’s say that there’s a known digital signature issued by a trusted CA.
Normally, digital signatures need to be evaluated: checked if they are expired, revoked, if there’s a problem in the chain of trust. However, if these aspects are a g… Continue reading Is hashing a digital signature for quick (but incomplete) validation a known and/or acceptable practice?

Web Browser and server using ECDHE_RSA cypher suite, then what is the use of X.509 certificate public key for?

User Crover has given a very great explanation for this question:
RSA or ECDHE for x.509 certificates-what does each do?
I have one question to Crover and/or any other member.
What I understand from the Crover’s answer, if client (a Web Br… Continue reading Web Browser and server using ECDHE_RSA cypher suite, then what is the use of X.509 certificate public key for?

cryptography – BitBox02 firmware signed & public key attached to firmware image for verification

Bootloader of the BitBox02 crypto wallet verifies the main application with the public keys that are attached to the firmware update itself. Next to that, there are signatures of the public keys, signed by the company’s private key.

Devic… Continue reading cryptography – BitBox02 firmware signed & public key attached to firmware image for verification