Guest Post: Study identifies more than 1 million hidden root certificates operated by 5,000 organizations, including government/enterprise agencies and TLS-interception software.
Guest Post: It’s time to upgrade HTTPS to better handle privacy concerns.
‘How to’ posts are a great way to learn how to use a new tool, troubleshoot problems, or perform advanced tasks. Here are three of 2021’s best.
Guest Post: A free (even for commercial use), generic, TLS decryption proxy for protocols using TLS encryption.
Guest Post: An investigation into an HTTPS interception attack using a custom root CA.
Guest Post: HTTPS RRs and STS look similar but there are subtle differences in the threat models and deployment tradeoffs of each.
Guest Post: Website admins have a role to play to make sure HTTPS is deployed everywhere across the web.
Guest Post: HTTPS adds an encrypted layer of protection, applying TLS to your browser’s communications with the website, which hides the information being sent back and forth, ensuring prying eyes cannot see the information.
Guest Post: Researchers have been able to identify underlying HTTP features by observing HTTPS connections.
Remote Triggered Blackholing has major limitations when applied at Internet Exchange Points.