Certificate and Public Key Pinning A nation state with control over a Certificate Authority could create SSL certs for any domain and easily perform a MITM. That's the risk. First idea that comes to mind to mitigate it, would be to at least pin domains to CAs so that a random CA controlled by a nation state can't issue a new certificate for any domain without going unnoticed. This might be overkill and apparently is not a good idea: - PKI has significantly improved - browser vendors (Google, Mozilla, Apple, Microsoft) now strictly control CA trust stores and remove non-compliant CAs - Certificate Transparency - all certificates must be publicly logged, making rogue certificates detectable - CAA records - DNS records that specify which CAs can issue certificates for a domain - Pinning creates major operational risks - misconfigured pins can cause complete outages that are difficult to recover from But just out of curiosity, I'm trying a Firefox add-on that notifies you every time something changes in the certificate of a website that you had already visited. It can be configured to only notify you on a change of the issuer. So if a website goes from Let's Encrypt CA to CCP CA, you should worry xD Here's the extension: ![Certificate Watch configuration](https://m.stacker.news/108129)