When you include a new trusted root certificate on your device, you enable the third-party to gather almost any piece of data transmitted to or from your device. The installation of an additional root CA cert potentially undermines the security of all your software and communications. They’re issued by a certified authority (CA) and, essentially, verify that the software/website owner is who they say they are. Root CA certs are the cornerstone of authentication and security in software and on the Internet. (Image credit: Future) What are the risks of installing an additional trusted root certificate?
0 Comments
Leave a Reply. |