Suspecious username for a plant-critique "blabla". If you had read any of the CA posts you'd both know why that is the case, and also how easy it would be to test.
I can give you a private/public key, certificate, the CA (and password for that) and some traffic I've sniffed while interacting with a webserver, using the forementioned key and certificate.
Good luck decrypting the traffic. The only thing you'd be able to succesfully do is pretend that YOUR server is actually mine (and proxy from your server to mine). That's an undetected breach, and an MITM attack.
OPs point is still entirely valid. You got my private key from ME, not the CA, and even then you're unable to decrypt the traffic (past).
I can give you a private/public key, certificate, the CA (and password for that) and some traffic I've sniffed while interacting with a webserver, using the forementioned key and certificate.
Good luck decrypting the traffic. The only thing you'd be able to succesfully do is pretend that YOUR server is actually mine (and proxy from your server to mine). That's an undetected breach, and an MITM attack.
OPs point is still entirely valid. You got my private key from ME, not the CA, and even then you're unable to decrypt the traffic (past).