Shall i reveal those screenshots for you?
A recurring unparsed hex blob (04 82 01 e1 ...) is unusual. This appears across several certificate chains and is not decoded by the OS viewer. If this is not handled or validated correctly, it could:
Obfuscate malicious certificate injection.
Represent unverified timestamping authority behavior (TSA misuse).
Hide alternate chain anchors or backdated signatures.
Key Identifiers & Algorithm Consistency
SHA-256 with RSA Encryption is standard and expected.
The public key size is 2048 bits (minimum acceptable today).
No unusual padding schemes are defined, which is good.
However, some certificates mix:
SHA-1 and SHA-256 fingerprints.
This may indicate backward compatibility or legacy trust chain inclusion.
SHA-1 is deprecated due to collision vulnerabilities. Its presence in a live certificate chain, especially in lockdown mode, suggests either:
A non-updated root store.
An attacker reusing legacy trusted paths
Organizational & Serial Chain
Apple Public EV Server RSA CA 2 - G1 issued by DigiCert High Assurance EV Root CA
Certificate valid from March 30, 2023 to October 30, 2025
CA is DigiCert, but multiple sub-issuers are present with identical public key sizes and policies.
Serial and chain values appear legitimate on surface, but duplication of key size and identical parameters across intermediate certs may suggest:
Redundancy (ok).
Or shadow duplication (potential spoofing)
Lockdown Mode Active
The device is in “Lockdown Enabled” mode, which is meant to restrict even minor certificate or profile deviations.
These mixed fingerprints, SANs, and timestamp anomalies should not appear under Lockdown if certificate transparency and verification are enforced properly. Their presence means:
A jailbroken or bypassed Lockdown mode.
Or Apple trust store misconfiguration or redirection at a lower level (DNS, MDM, or captive proxy).