Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That's true, but I can still type in an IP address and communicate with any webserver I want on the entire internet.

I guess you don't remember in 2018 when Comodo revoked sci-hub's TLS certs under corporate political pressure. This style of revocation combined with HTTPS only browsers is effectively a block that can't be bypassed. I am not saying that the DNS system cannot be used for political attack. It obviously can. It was used as such against sci-hub before they started attacking via the cert provider. What I am saying is that blocking HTTP in the browser makes the consequences much, much worse.

It greatly increases the incentives for revoking TLS certs for political reasons due to increased effectiveness. The cert authority doesn't even have to be malicious. All they have to do is be "law abiding" relative to some country with a bad set of laws.



Still not seeing how that's any different from DNS. I mean yes, obviously it's another possible point of failure. But I don't see MITM protection as being any less important than name resolution on the modern web. Seems no less reasonable for a site to break due to lack of MITM protection than for it to break due to failure of name resolution. Normal users aren't going to be manually looking up and navigating to IP addresses anymore than they're going to be manually installing TLS certificates.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: