From 802401481f0120c1ec214ac5111397a82d03b00f Mon Sep 17 00:00:00 2001
From: dyzulk <66510723+dyzulk@users.noreply.github.com>
Date: Thu, 8 Jan 2026 19:32:38 +0700
Subject: [PATCH] doc: merge pki intro to index and replace emojis
---
pages/guide/concepts/_meta.json | 3 +-
pages/guide/concepts/index.mdx | 65 +++++++++++++++++-------------
pages/guide/concepts/pki-intro.mdx | 26 ------------
3 files changed, 37 insertions(+), 57 deletions(-)
delete mode 100644 pages/guide/concepts/pki-intro.mdx
diff --git a/pages/guide/concepts/_meta.json b/pages/guide/concepts/_meta.json
index 2deddee..f3c10f3 100644
--- a/pages/guide/concepts/_meta.json
+++ b/pages/guide/concepts/_meta.json
@@ -1,4 +1,3 @@
{
- "pki-intro": "What is PKI?",
- "cert-types": "Certificate Types"
+ "index": "PKI Fundamentals"
}
\ No newline at end of file
diff --git a/pages/guide/concepts/index.mdx b/pages/guide/concepts/index.mdx
index b9aa682..c68585b 100644
--- a/pages/guide/concepts/index.mdx
+++ b/pages/guide/concepts/index.mdx
@@ -1,52 +1,60 @@
import { Callout, Cards, Card } from 'nextra/components'
-import { ShieldCheck, ShieldAlert, BadgeCheck, Lock } from 'lucide-react'
+import { ShieldCheck, ShieldAlert, BadgeCheck, Lock, Key, Link, CheckCircle2, XCircle } from 'lucide-react'
# PKI Fundamentals & Trust Context
-Understanding the difference between **Private PKI** (TrustLab) and **Public PKI** (Let's Encrypt, DigiCert) is critical for using SSL/TLS effectively and safely.
+**Public Key Infrastructure (PKI)** is the framework that allows secure communication over the internet. It relies on cryptographic keys and a chain of trust to verify identities.
+
+## Core Concepts
+
+Understanding these two mechanisms is essential to understanding how TrustLab works.
+
+### 1. Asymmetric Encryption
+Secure communication relies on a pair of keys:
+* **Public Key**: Shared with everyone. Used to **encrypt** data.
+* **Private Key**: Kept secret. Used to **decrypt** data and **sign** digital assets.
+
+### 2. The Chain of Trust
+A certificate is only trusted if it is signed by a known authority. This forms a chain:
+* **Root CA**: The trusted anchor. It signs itself. You must install this on your device to trust the chain.
+* **Intermediate CA**: Signed by the Root CA. Used to sign day-to-day certificates for security.
+* **Leaf Certificate**: The final certificate used on your Web Server or Email.
+
+---
## The Two Lanes of Trust
-The internet security model is built on two distinct "lanes" of trust. Mixing them up causes errors, but using them correctly provides **Military-Grade Security**.
+The internet security model is built on two distinct "lanes". Mixing them up causes browser errors, but using them correctly provides **Military-Grade Security**.
- } title="Public Lane (Global)" href="#1-public-pki" arrow />
- } title="Private Lane (Internal)" href="#2-private-pki-trustlab" arrow />
+ } title="Public Lane (Global)" href="#public-pki" arrow />
+ } title="Private Lane (Internal)" href="#private-pki-trustlab" arrow />
-### 1. Public PKI
+### Public PKI
* **Issuer**: Let's Encrypt, DigiCert, Google Trust Services.
* **Trust Model**: Pre-installed in every browser/OS (Chrome, Windows, iOS) by default.
-* **Verification**: Requires you to own a public domain (e.g., `google.com`).
-* **Limitation**: **Cannot** issue certificates for:
- * Private IP Addresses (e.g., `192.168.1.50`).
- * Internal Domain Names (e.g., `company.local`, `dev.internal`).
- * Intranet servers behind a firewall.
+* **Limitation**: **Cannot** issue certificates for Private IPs (`192.168.x.x`) or Internal Domains (`.local`, `.lan`).
-### 2. Private PKI (TrustLab)
+### Private PKI (TrustLab)
* **Issuer**: TrustLab Root CA (Your Organization).
-* **Trust Model**: Trusted **ONLY** by devices that have installed your Root CA.
-* **Strength**: Uses the **exact same math** (RSA-2048/4096, SHA-256) as Public CAs.
-* **Superpower**: Can secure **ANYTHING**:
- * Localhost (`localhost`).
- * Database Servers (`10.0.0.5`).
- * Development Environments.
- * Internal APIs.
+* **Trust Model**: Trusted **ONLY** by devices that have explicitly installed your Root CA.
+* **Superpower**: Can secure **ANYTHING** internal (Localhost, Database Servers, IoT).
---
## Why "Military Grade"?
-TrustLab utilizes **OpenSSL**, the same cryptographic core used by majority of the world's secure servers, banks, and military networks.
+TrustLab utilizes **OpenSSL**, the same cryptographic core used by the world's highly secure networks.
| Feature | TrustLab (Private) | Public CA (Paid) |
| :--- | :--- | :--- |
| **Encryption** | RSA-2048 / RSA-4096 | RSA-2048 / RSA-4096 |
| **Signature** | SHA-256 | SHA-256 |
| **Protocol** | TLS 1.2 / 1.3 | TLS 1.2 / 1.3 |
-| **Global Trust** | ❌ (Manual Install Required) | ✅ (Pre-installed) |
-| **Internal IPs** | ✅ Supported | ❌ Forbidden |
-| **Cost** | **Free** | $400+/month (for Private CA) |
+| **Global Trust** | (Manual Install) | (Pre-installed) |
+| **Internal IPs** | Supported | Forbidden |
+| **Cost** | **Free** | $400+/month (Private CA) |
## Appropriate Use Cases
@@ -56,16 +64,15 @@ TrustLab utilizes **OpenSSL**, the same cryptographic core used by majority of t
Use **Public CAs** for anything the Public Internet MUST access.
-### ✅ Perfect For (Green Lane)
+### Perfect For (Green Lane)
* **Internal Tools**: Admin Panels, HR Portals, Dashboards.
* **Development**: Testing HTTPS on `localhost` or `dev.local`.
-* **Databases**: Securing connection to MySQL/Postgres/Mongo.
-* **IoT Devices**: Securing communication between sensors and local hubs.
-* **S/MIME**: Encrypting email between employees.
+* **Databases**: Securing connections to MySQL/Postgres/Mongo.
+* **S/MIME**: Encrypting email between internal employees.
-### ❌ Do Not Use For (Red Lane)
+### Do Not Use For (Red Lane)
* **Public E-Commerce**: Your customer's browser will show a "Not Secure" warning.
-* **Public Blogs/Websites**: Random visitors will not have your Root CA installed.
+* **Public Blogs/Websites**: Random visitors do not have your Root CA installed.
## The "Trust Split" Myth
diff --git a/pages/guide/concepts/pki-intro.mdx b/pages/guide/concepts/pki-intro.mdx
deleted file mode 100644
index b9fdc1d..0000000
--- a/pages/guide/concepts/pki-intro.mdx
+++ /dev/null
@@ -1,26 +0,0 @@
-# What is PKI?
-
-**Public Key Infrastructure (PKI)** is a set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, store, and revoke digital certificates.
-
-## Core Concepts
-
-### 1. Asymmetric Encryption
-PKI relies on a pair of keys:
-- **Public Key**: Shared with everyone. Used to encrypt data.
-- **Private Key**: Kept secret. Used to decrypt data and *sign* digital assets.
-
-### 2. The Chain of Trust
-A certificate is only trusted if it is signed by a trusted issuer.
-- **Root CA**: The anchor of trust. It signs itself (Self-Signed). You explicitly trust this on your device.
-- **Intermediate CA**: Signed by Root CA. Used to sign End-Entity certificates for security.
-- **End-Entity (Leaf)**: The certificate used on your Web Server or Email.
-
-TrustLab manages this entire chain for your internal organization.
-
-### 3. Why Internal PKI?
-Using Public CAs (like Let's Encrypt) is great for public websites, but incompatible with:
-- **Intranet IPs** (e.g., `10.0.0.1`).
-- **Internal Domains** (e.g., `.local`, `.corp`).
-- **VPN Services**.
-
-TrustLab fills this gap by acting as your private authority.