Does self-signed encryption certificate violate "no multi-use keys" principle?

Say that I have generated an RSA keypair, which I intend to publish only for use with RSA-KEM; I can see that this is provisioned for:

The intended application for the key MAY be indicated in the key usage certificate extension (see RFC 5… Continue reading Does self-signed encryption certificate violate "no multi-use keys" principle?

Is it fine if I share a .pfx self signed certificate generated inside my machine with other users to test and use PnPCore SDK

We want to develop some Azure functions which use PnPCore SDK. For testing purposes, I registered an Azure app which uses self-signed certificate for authentication.
Now I configured the Azure app registration to only access our SharePoint… Continue reading Is it fine if I share a .pfx self signed certificate generated inside my machine with other users to test and use PnPCore SDK

With selfhosting email server, selfsigned certificate, does it make a difference with PGP mail, What can be leaked?

If we are self hosting our own email server with mydomain.com with a self sign CA for S/MIME. What are some possible ways that our email content can get leaked?
Then if we use PGP email, does it make any difference? Since we agree that wit… Continue reading With selfhosting email server, selfsigned certificate, does it make a difference with PGP mail, What can be leaked?

Is Self-Signed certificate sufficient for Production environments exposed to the Internet to secure our Azure Function

We have created an Azure Function which runs on a scheduled basis to update Sharepoint Online sites (each 10 minutes).
Now for this Azure Function to integrate with SharePoint, we have created an Active Directory App and we defined a Self-… Continue reading Is Self-Signed certificate sufficient for Production environments exposed to the Internet to secure our Azure Function

how to use a self signed certificate to intercept traffic in MITM attack [closed]

We have a project at university about MITM attacks and our focus is to show how one can get into the communication between two endpoints, given different circumstances and security measures (that we decide).
Since I don’t have much knowled… Continue reading how to use a self signed certificate to intercept traffic in MITM attack [closed]