We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
bmxer4130 (2921457) writes "I have noticed a most peculiar symptom of all devices on my network.
Every computer, laptop, tablet, android device, etcetera on my network is filled with malicious certificates, and there seems to be no way to get rid of them, despite my valiant security measures. Even after wiping my Android devices as thoroughly as possible, even doing 'NAND Erase All' through Odin, I still find these certs in my CA store. On my Desktop computer, which is currently running Qubes R2 Beta, my Firefox CA store lists all of the exact same questionable certificates. I am beginning to believe this is most likely due to my poor choice of a rather insecure Linksys WRT54G firmware: DD-WRT, which is extremely exploitable. Although it is clearly a bad idea to continue using it, I'd like to be able pinpoint the exact source of these certs in hopes of bolstering my defences.
Among the certificates include recorded compromised 'TURKTRUST' certs, GoDaddy, Taiwan Govt, Japanese Govt, etc, etc. I can make an archive of the exported certs if anybody is interested in analysing them.
I would greatly appreciate any technical advice, specifically pertaining to: possible causes of these certs, protection from them, and observing how these certs are travelling to my devices and from where. I would also highly enjoy any discussion related to this problem and anybody's personal experience with similar situations."