Profile picture
, 3 tweets, 1 min read Read on Twitter
A lot of people have asked me about the story on all the .gov certs expiring during the shutdown: news.netcraft.com/archives/2019/…

The security risk to users is actually very low, since trusting a recently expired cert doesn't in and of itself allow traffic to be intercepted.
The bigger user impact is being locked out of federal services, and of course how it weakens trust in federal agencies to show security warnings to users.

The culprit here is a severe lack of automation across agencies: certificate renewal should never need manual intervention.
Automation is critical to modernization, in more than just cybersecurity. And too many federal agencies fail to prioritize automation, or just don't have the skillset to do it.

Expired certificates are just the most publicly visible symptom of legacy infrastructure and process.
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Eric Mill
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member and get exclusive features!

Premium member ($3.00/month or $30.00/year)

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!