Let’s Encrypt announced it’s root certificate ISRG Root X1 is now directly trusted by Microsoft and all other major root certificate programs including Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry.
Starting from the first issuance the Let’s Encrypt intermediate certificates, Let’s Encrypt Authority X1 and Let’s Encrypt Authority X2 was cross-signed with IdenTrust root and trusted by all the major browsers.
Browsers and operating systems not supported by default to Let’s Encrypt certificates, so it was cross-signed by IdenTrust and the IdenTrust certificate trusted by the Browsers and operating systems directly.
Starting July 2018 Let’s Encrypt certificate directly trusted by almost all newer versions of operating systems, browsers, and devices.
“Some of those older systems will eventually be updated to trust Let’s Encrypt directly. Some will not, and we’ll need to wait for the vast majority of those to cycle out of the Web ecosystem.”
Let’s Encrypt says it would take at least five more years to cycle out the Web ecosystem, so they planned to continue the cross signature until then.
Now the Let’s Encrypt serves more than 115 million websites, it had a very good progress as it breaks the technical and cost barriers.
Let’s Encrypt Authority X3 (IdenTrust cross-signed)
Let’s Encrypt Authority X3 (Signed by ISRG Root X1)
Let’s Encrypt Authority X4 (IdenTrust cross-signed)
Let’s Encrypt Authority X4 (Signed by ISRG Root X1)
Site owner’s of Let’s Encrypt not required to make any changes and the site’s continue to work normally.
Transport Layer Security (TLS) 1.3 approved by IETF With the 28th Draft
Private keys Leaked – 23,000 SSL Certificates to be Revoked Within Next 24 Hours
New Method to Establish Covert Channel Communication by Abusing X.509 Digital Certificates
A ransomware attack on Blue Yonder, a leading supply chain management software provider, has created…
Dell Technologies has released a security update for its Wyse Management Suite (WMS) to address…
The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team Assessment…
IBM has issued a security bulletin warning customers about a vulnerability in its Workload Scheduler…
Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions of…
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…