Self-signed certificate — In cryptography and computer security, a self signed certificate is an identity certificate that is signed by its own creator. That is, the person that created the certificate also signed off on its legitimacy.In typical public key infrastructure … Wikipedia
Public key certificate — Diagram of an example usage of digital certificate In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document which uses a digital signature to bind a public key with an… … Wikipedia
Root certificate — In cryptography and computer security, a root certificate is either an unsigned public key certificate or a self signed certificate that identifies the Root Certificate Authority (CA). A root certificate is part of a public key infrastructure… … Wikipedia
Certificate authority — In cryptography, a certificate authority, or certification authority, (CA) is an entity that issues digital certificates. The digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others… … Wikipedia
Tiananmen Square self-immolation incident — The Tiananmen Square self immolation incident took place on 23 January 2001. Five people attempted to set themselves on fire in Tiananmen Square, Beijing. Within hours, the news was publicised by China Central Television (CCTV), who claimed the… … Wikipedia
Https — Hypertext Transfer Protocol over Secure Socket Layer or HTTPS is a URI scheme used to indicate a secure HTTP connection. It is syntactically identical to the http:// scheme normally used for accessing resources using HTTP. Using an https: URL… … Wikipedia
Opportunistic encryption — (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel otherwise falling back to unencrypted communications. This method requires no pre arrangement between the two systems. Opportunistic … Wikipedia
X.509 — In cryptography, X.509 is an ITU T standard for a public key infrastructure (PKI) for single sign on and Privilege Management Infrastructure (PMI). X.509 specifies, amongst other things, standard formats for public key certificates, certificate… … Wikipedia
CAcert.org — is a community driven certificate authority that issues free public key certificates to the public [ [https://www.cacert.org/index.php?id=12 About CAcert] ] (unlike other certificate authorities which are commercial and sell certificates). CAcert … Wikipedia
Obfuscated TCP — (ObsTCP) was a proposal for a transport layer protocol which implements opportunistic encryption over TCP. It was designed to prevent mass wiretapping and malicious corruption of TCP traffic on the internet, with lower implementation cost and… … Wikipedia
Public key fingerprint — In public key cryptography, a public key fingerprint is a short sequence of bytes used to authenticate or look up a longer public key. Fingerprints are created by applying a cryptographic hash function to a public key. Since fingerprints are… … Wikipedia