Public Key Infrastructure: Digital Trust Foundation

Threat Talks infographic

Find Threat Talks on

Public Key Infrastructure: The Foundation of Digital Trust

PKI isn’t paperwork.
It’s the switch that turns digital trust on—or off.
Set it up right and you get clean SSL decryption, hardened admin access, and identities that hold.
Mess it up and you gift attackers blind spots they’ll live in for months.
In this Deep Dive, host Lieuwe Jan Koning sits with Rob Maas (Field CTO, ON2IT) to break down how PKI really works—and how ON2IT built theirs to survive failure, audits, and human error.

What you’ll learn:
• Why PKI matters for SSL decryption and secure connections
• The role of root certificates, intermediates, and the chain of trust
• Lessons learned from compromised private keys
• ON2IT’s PKI setup with offline signing and key bearers
• Certificate lifetimes and automation with ACME

Bottom line: PKI is either your strongest control or your biggest liability. Choose.

Additional Resources
• Threat Talks Episode on SSL Decryption – https://youtu.be/Xv_jVHVsD9w
• ACME protocol (RFC 8555): https://datatracker.ietf.org/doc/rfc8555/
• Let’s Encrypt / ACME protocol – https://letsencrypt.org
• DigiNotar case study background – https://en.wikipedia.org/wiki/DigiNotar
• Mozilla CA Program (trusted root store): https://wiki.mozilla.org/CA
• infographic about encryption  https://on2it.s3.us-east-1.amazonaws.com/20250304_Infographic_Encryption.pdf

Your cybersecurity experts

Lieuwe Jan Koning

Co-Founder and CTO
ON2IT

Rob Maas, Field CTO, ON2IT

Rob Maas

Field CTO
ON2IT

Episode details

PKI is the engine that powers SSL decryption, locks down management interfaces, and makes certificates actually verifiable across systems and browsers. Get it wrong and you hand attackers avoidable openings.
In this Deep Dive, Lieuwe Jan Koning and Rob Maas make PKI practical. They map root → intermediates → server certs, show why the chain of trust lives or dies on details. They unpacked ON2IT’s own build: an offline root on Raspberry Pi, strict key-bearer procedures, and ACME-driven short-lived certificates for scale without ceremony.

Key topics:
• Why PKI matters for SSL decryption and secure connections
• The role of root certificates, intermediates, and the chain of trust
• Lessons learned from compromised private keys
• How to balance long-term stability with day-to-day agility

    Threat Talks infographic

    Get your Hacker T-shirt

    Join the treasure hunt!

    Find the code within this episode and receive your own hacker t-shirt for free.

    10 + 4 =

    Christmas Hacker