I was able to grasp how CT works by reading this explanation, but one thing remains unclear for me - how CT may protect ecosystem from hacked CA server. For example, someone hacked Digicert, and now from it behaves issues EV or regular certificates to malicious domains that end up in CT logs and as consequence browsers trust this certificates.
Asked
Active
Viewed 40 times
So it will not be seen if a CA is hacked, but it will be seen what the attacker does with the hacked CA (issuing certificates).- does it mean that certificates from hacked CA will be valid for some time (minutes or hours) until the issued certificates by hacker will be revoked? – Ghost Rider Sep 16 '22 at 14:45Everyone can watch which certificates are issued and critical actors like google, facebook etc will quickly realize if someone is issuing certificates for their domains.- what happens if hacked CA will issue certificates to new domains not associated with big companies, just $(random_string).com - and hacked CA will not declare itself as hacked to save reputation? – Ghost Rider Sep 17 '22 at 01:19