{"id":3325,"date":"2011-09-26T11:53:50","date_gmt":"2011-09-26T10:53:50","guid":{"rendered":"http:\/\/blog.intego.com\/?p=3325"},"modified":"2023-04-11T17:50:25","modified_gmt":"2023-04-12T00:50:25","slug":"protect-your-mac-from-rogue-certificates","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/","title":{"rendered":"Protect Your Mac from Rogue SSL Certificates from DigiNotar"},"content":{"rendered":"<p>We recently <a href=\"https:\/\/www.intego.com\/mac-security-blog\/diginotar-certificate-hack-what-happened-and-how\/\">discussed an issue regarding rogue SSL certificates<\/a>, and the danger therein. These certificates were issued by a hacker who broke into the computers of a Dutch certificate authority, DigiNotar. This issue &#8211; and several others in recent months &#8211; have made people realize that these SSL certificates, which are designed to ensure that you are connecting to a valid web site, aren&#8217;t as solid as they once thought. For this reason, you need to understand how they work, and what you can do to protect your Mac.<\/p>\n<p>Glenn Fleishman, on Macworld, has written <a href=\"https:\/\/web.archive.org\/web\/20161115010816\/http:\/\/www.macworld.com:80\/article\/1162472\/keep_your_mac_safe_from_web_security_flaws.html\" target=\"_blank\" rel=\"noopener\">an extensive article about security certificates<\/a> and how to work with them. He discusses how these certificates work, and how you can verify certificates. He also explains what security settings you can use to make sure that you are as safe as possible, and how to remove untrustworthy certificate authorities from your Mac.<\/p>\n<p>It&#8217;s a long article, and covers a lot of detail, but understanding how these certificates work can help you take the steps necessary to protect your Mac and your data.<\/p>\n<p>For even more information about the DigiNotar breach, see Joshua Long&#8217;s comprehensive article on <a href=\"https:\/\/security.thejoshmeister.com\/2011\/08\/how-to-revoke-trust-for-diginotar-root.html\" target=\"_blank\" rel=\"noopener\">How to Revoke Trust for DigiNotar Root CA Certs\u2014Even On Older Macs<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about SSL certificates, how they work and how you can protect your Mac from rogue certificates.<\/p>\n","protected":false},"author":3,"featured_media":8975,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,11],"tags":[4678,3154,128,129],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Learn about SSL certificates, how they work and how you can protect your Mac from rogue certificates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Mac from Rogue SSL Certificates from DigiNotar - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Learn about SSL certificates, how they work and how you can protect your Mac from rogue certificates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-09-26T10:53:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-12T00:50:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/exclamation-point.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/exclamation-point.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/exclamation-point.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/\",\"name\":\"Protect Your Mac from Rogue SSL Certificates from DigiNotar - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#primaryimage\"},\"datePublished\":\"2011-09-26T10:53:50+00:00\",\"dateModified\":\"2023-04-12T00:50:25+00:00\",\"description\":\"Learn about SSL certificates, how they work and how you can protect your Mac from rogue certificates.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Your Mac from Rogue SSL Certificates from DigiNotar\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Protect Your Mac from Rogue SSL Certificates from DigiNotar\",\"datePublished\":\"2011-09-26T10:53:50+00:00\",\"dateModified\":\"2023-04-12T00:50:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#webpage\"},\"wordCount\":214,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/exclamation-point.jpg\",\"keywords\":[\"DigiNotar\",\"Security &amp; Privacy\",\"TLS\/SSL Certificate\",\"TLS\/SSL Certificates\"],\"articleSection\":[\"Security &amp; Privacy\",\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Learn about SSL certificates, how they work and how you can protect your Mac from rogue certificates.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/","og_locale":"en_US","og_type":"article","og_title":"Protect Your Mac from Rogue SSL Certificates from DigiNotar - The Mac Security Blog","og_description":"Learn about SSL certificates, how they work and how you can protect your Mac from rogue certificates.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/","og_site_name":"The Mac Security Blog","article_published_time":"2011-09-26T10:53:50+00:00","article_modified_time":"2023-04-12T00:50:25+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/exclamation-point.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/exclamation-point.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/exclamation-point.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/","name":"Protect Your Mac from Rogue SSL Certificates from DigiNotar - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#primaryimage"},"datePublished":"2011-09-26T10:53:50+00:00","dateModified":"2023-04-12T00:50:25+00:00","description":"Learn about SSL certificates, how they work and how you can protect your Mac from rogue certificates.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Protect Your Mac from Rogue SSL Certificates from DigiNotar"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Protect Your Mac from Rogue SSL Certificates from DigiNotar","datePublished":"2011-09-26T10:53:50+00:00","dateModified":"2023-04-12T00:50:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#webpage"},"wordCount":214,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/exclamation-point.jpg","keywords":["DigiNotar","Security &amp; Privacy","TLS\/SSL Certificate","TLS\/SSL Certificates"],"articleSection":["Security &amp; Privacy","Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/protect-your-mac-from-rogue-certificates\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/exclamation-point.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-RD","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3325"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=3325"}],"version-history":[{"count":2,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3325\/revisions"}],"predecessor-version":[{"id":97689,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3325\/revisions\/97689"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8975"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=3325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=3325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=3325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}