@Hyolobrika It almost works like that already. When you open a page on a server with self-signed cert, it gives you a warning, if you accept it, it adds an exception for that cert — you can see the list in preferences under Privacy & Security → Certificates → View certificates → Servers
@Hyolobrika Yes, you just import it into your OS's certificate store. If you operate your own CA root you can just import that one cert into every device and they'll all recognize your self-signed certs as trusted.
This is harder to do on Linux which has far less mature concept of a global certificate store and may even differ between distros (last I checked RHEL has the best solution and I tried to get traction cloning their scripts for managing certs and blacklists into FreeBSD), but it has improved a ton within the last 5 or so years.
@Hyolobrika@m0xee PGP revocation requires that you search the same keyservers for the revocation that they published it to. If they didn't publish it where you'll find it you're screwed.
But yeah theoretically you could have a private CRL server if we could get OSes and browsers to let us configure it
@Hyolobrika@Hyolobrika Self-signed certs do not provide the capability to revoke them. Imagine that a malicious actor isn't just spoofing the site you trust with their own self-signed cert, but that the private key got compromised. With self-signed certs you have no way of telling users that the already trusted certificate is no longer valid, such a capability implies some sort of infrastructure and infrastructure implies hierarchy as someone has to operate it🤷