Guest Post: A free (even for commercial use), generic, TLS decryption proxy for protocols using TLS encryption.
Guest Post: An investigation into an HTTPS interception attack using a custom root CA.
Guest Post: HTTPS RRs and STS look similar but there are subtle differences in the threat models and deployment tradeoffs of each.
Guest Post: Website admins have a role to play to make sure HTTPS is deployed everywhere across the web.
Guest Post: HTTPS adds an encrypted layer of protection, applying TLS to your browser’s communications with the website, which hides the information being sent back and forth, ensuring prying eyes cannot see the information.
Guest Post: Researchers have been able to identify underlying HTTP features by observing HTTPS connections.
Remote Triggered Blackholing has major limitations when applied at Internet Exchange Points.
What do we expect from protocols, and how do standards affect deployment?
DOH (DNS over HTTPS) and other means to secure the DNS attracted plenty of discussion at the recent DNS-OARC meeting.
A deeper look at the potential benefits of DNS over HTTPS, or DOH.