{"id":12891,"date":"2018-07-24T10:45:13","date_gmt":"2018-07-24T18:45:13","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/07\/24\/news-6658\/"},"modified":"2018-07-24T10:45:13","modified_gmt":"2018-07-24T18:45:13","slug":"news-6658","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/07\/24\/news-6658\/","title":{"rendered":"Google Chrome Now Labels HTTP Sites as &#8216;Not Secure&#8217;"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5b565a6af8295802a6ec48cf\/master\/pass\/google_chrome_not_secure_https-01%20(1).jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Tue, 24 Jul 2018 17:00:53 +0000<\/strong><\/p>\n<p><span class=\"lede\">Nearly two years <\/span>ago, <a href=\"https:\/\/www.wired.com\/2016\/11\/googles-chrome-hackers-flip-webs-security-model\/\">Google made a pledge<\/a>: It would name and shame websites with unencrypted connections, a strategy designed to spur web developers to <a href=\"https:\/\/www.wired.com\/2016\/04\/hacker-lexicon-what-is-https-encryption\/\">embrace HTTPS<\/a> encryption. On Tuesday, it finally is following through.<\/p>\n<p>With the launch of Chrome 68, Google now will call out sites with unencrypted connections as \u201cNot Secure\u201d in the URL bar. The move flips the convention of how Chrome displays the security of sites on its head. Previously, pages that deployed HTTPS-enabled encrypted connections featured a green lock icon and the word \u201cSecure\u201d in the URL bar. HTTP sites had a small icon that you could click for more information; if you did, it read \u201cYour connection to this site is not secure. You should not enter any sensitive information on this site (for example, passwords or credit cards), because it could be stolen by attackers.\u201d<\/p>\n<p class=\"paywall\">It\u2019s a warning worth heeding. Under an unencrypted HTTP connection, any information that you send across the web can be intercepted by a hacker or other bad actor. In extreme cases, like in what are called man-in-the-middle attacks, someone could pose as a destination site\u2014tricking you into handing over your credentials, credit card info, or other sensitive information.<\/p>\n<p class=\"paywall\">\u201cEncryption is something that web users should expect by default,\u201d says Chrome security product manager Emily Schechter.<\/p>\n<p class=\"paywall\">The use of HTTP has privacy implications as well. If you\u2019re browsing on an unsecured connection, your internet provider and any bad actors can hypothetically see not just which site you\u2019re on, but what specific pages. Not so with HTTPS, a benefit that has <a href=\"https:\/\/www.wired.com\/2016\/10\/quest-make-porn-sites-secure\/\">clear implications for, say, adult sites<\/a>. Even innocuous sites\u2014pages that neither ask for nor contain sensitive information\u2014have good reason to embrace it.<\/p>\n<p>&#x27;Encryption is something that web users should expect by default.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Emily Schechter, Google<\/p>\n<p class=\"paywall\">\u201cYou may occasionally be in a coffee shop. If you go to a non-HTTPS site, sometimes you\u2019ll get ads that pop over the page. Those aren\u2019t ads from the web page; they\u2019ve been injected somewhere along the way. That kind of behavior is what HTTPS overcomes,\u201d says Ross Schulman, senior counsel at New America\u2019s Open Technology Institute. \u201cIt\u2019s not just ads. Malware is served this way, a lot. It\u2019s not just about making sure that user information is private; it really ensures the integrity of the website.\u201d<\/p>\n<p class=\"paywall\">Sticking a warning sign in front of unencrypted sites is just one step in a broader ongoing plan. In January 2017, Chrome put a warning on sites that asked for credit card information. Several months later, they instituted it on HTTP sites in so-called incognito windows.<\/p>\n<p class=\"paywall\">Despite the broader security benefits, Google\u2019s HTTPS push is not without its critics. Developer Dave Winer, one of the creators of RSS, objects to what he views as Google imposing its will on the open web. \u201cThe fact is that they\u2019re forcing it,\u201d says Winer, who also <a href=\"http:\/\/this.how\/googleAndHttp\/\" target=\"_blank\">wrote<\/a> a detailed objection in February. \u201cThey\u2019re just the tech industry. The web is so much bigger than the tech industry. That\u2019s the arrogance of this.\u201d<\/p>\n<p class=\"paywall\">Winer worries that forced HTTPS adoption\u2014and scolding sites that don\u2019t embrace it\u2014will penalize web developers who don\u2019t have the wherewithal to implement it, and potentially cordon off older, passively managed corners of the internet. He also says that Google won&#x27;t stop here: \u201cWas this the only way to achieve this end? Because this is draconian. If this were done properly, it would have been deliberated, and a lot of people who aren&#x27;t in the tech industry would have had a say in it.\u201d<\/p>\n<p class=\"paywall\">For what it\u2019s worth, Chrome is not alone in posting warnings next to HTTP sites; Firefox <a href=\"https:\/\/blog.mozilla.org\/security\/2017\/01\/20\/communicating-the-dangers-of-non-secure-http\/\" target=\"_blank\">has explored it too<\/a>. Between the two, they hold 73 percent of browser market share. In addition, Google notes that the vast majority of Chrome traffic\u201476 percent on Android, and 85 percent on ChromeOS\u2014already travels across an HTTPS connection. Gains have come not only from Google, but also from a broader push toward HTTPS that ranges from hosting sites like WordPress and Squarespace, to internet infrastructure firms like Cloudflare, to Let\u2019s Encrypt, which provides free certificates that enable HTTPS connections. As of Tuesday, Let&#x27;s Encrypt is encrypting 113 million sites.<\/p>\n<p class=\"paywall\">\u201cIt\u2019s not like you need a big IT department or a ton of money to turn on HTTPS. Particularly for small, simple sites, it should be extremely easy and straightforward,\u201d Schechter says.<\/p>\n<p class=\"paywall\">The ubiquity of HTTPS was no sure bet as recently as two years ago, when only 37 of the top 100 sites on the web used it. Now, according to Google, 83 do. (WIRED <a href=\"https:\/\/www.wired.com\/2016\/09\/wired-completely-encrypted\/\">made the jump in 2016<\/a>, in a rollout that took five months and no small number of headaches.) Let\u2019s Encrypt in particular has been a boon to smaller site operators.<\/p>\n<p class=\"paywall\">\u201cExpecting every website to enable HTTPS would have been unreasonable prior to the existence of Let&#x27;s Encrypt, which lowers financial, technical, and educational barriers to enabling HTTPS,\u201d says Josh Aas, cofounder of Internet Security Research Group, the organization behind Let\u2019s Encrypt. \u201cOur focus on ease of use at scale has been a primary driver behind the incredible growth in HTTPS deployment in recent years.\u201d<\/p>\n<p class=\"paywall\">In many ways, Tuesday\u2019s announcement is just the continuation of a plan to promote HTTPS around the web. In September, Google will remove the \u201cSecure\u201d indicator next to HTTPS sites, a sign that encrypted connections largely have become the default posture online. And in October, if you attempt to enter data on an HTTP page, Chrome will show you a \u201cnot secure\u201d warning in red.<\/p>\n<p class=\"paywall\">The web still has dangers plenty, and HTTPS may take a toll on certain sites that can\u2019t or won\u2019t upgrade. But at least from now on you can make a baseline assumption that your connection is secure. Because if it\u2019s not, Chrome will tell you.<\/p>\n<p class=\"related-cne-video-component__dek\">It\u2019s 2017! It\u2019s time to start using an encrypted messaging app. Why? Using end-to-end encryption means that no one can see what you\u2019re sharing back and forth.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/google-chrome-https-not-secure-label\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5b565a6af8295802a6ec48cf\/master\/pass\/google_chrome_not_secure_https-01%20(1).jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Tue, 24 Jul 2018 17:00:53 +0000<\/strong><\/p>\n<p>The world&#8217;s biggest browser now lets you know when you&#8217;re visiting an unencrypted site. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-12891","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12891"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12891\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}