{"id":7852,"date":"2017-06-06T07:11:26","date_gmt":"2017-06-06T15:11:26","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/06\/06\/news-1634\/"},"modified":"2017-06-06T07:11:26","modified_gmt":"2017-06-06T15:11:26","slug":"news-1634","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/06\/06\/news-1634\/","title":{"rendered":"HTTPS&#8230; Everywhere!"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Boursier| Date: Tue, 06 Jun 2017 14:00:43 +0000<\/strong><\/p>\n<p>We <a href=\"https:\/\/github.com\/EFForg\/https-everywhere\/pull\/9788\/files\" target=\"_blank\" rel=\"noopener noreferrer\">recently updated our redirections rule<\/a> in <a href=\"https:\/\/www.eff.org\/https-everywhere\" target=\"_blank\" rel=\"noopener noreferrer\">HTTPS-Everywhere<\/a>, a browser extension that automatically redirects you to the HTTPS version of the website you are trying to visit. Now is a good time for us to give a short\u00a0overview of how important HTTPS is. We&#8217;ll also talk about a few major HTTPS-related events that happened lately.<\/p>\n<p>When we browse the web, several third-parties are able to snoop on the connection between the user and the website, including the user&#8217;s ISP, law enforcement, the website&#8217;s ISP, and other\u00a0people in between.<\/p>\n<div id=\"attachment_18050\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/people.torproject.org\/~lunar\/tor-and-https\/en\/tor-and-https.svg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18050 size-large\" title=\"Who can snoop on your connection without HTTPS, and what can they see?\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/tor-https-0-600x464.png\" alt=\"Who can snoop on your connection without HTTPS, and what can they see?\" width=\"600\" height=\"464\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/tor-https-0-600x464.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/tor-https-0-300x232.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/tor-https-0.png 990w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\"><em>Who can snoop on your connection without HTTPS, and what can they see? (by The TorProject)<\/em><\/p>\n<\/div>\n<p>These intermediaries are able to obtain and modify on the fly most of the information sent through the connection: the website reached, the web page name and content, the potential username and password, the user&#8217;s IP address, and more. It obviously poses a lot of problems, which is\u00a0why HTTPS is now mandatory for more and more websites (<a href=\"https:\/\/https.cio.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">public sector<\/a>, banks, etc.). Using HTTP with SSL\/TLS (HTTPS) hides much of information compared to the picture above:<\/p>\n<div id=\"attachment_18049\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/people.torproject.org\/~lunar\/tor-and-https\/en\/tor-and-https.svg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18049 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/tor-and-https-1-600x464.png\" alt=\"Who can snoop on your connection with HTTPS?\" width=\"600\" height=\"464\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/tor-and-https-1-600x464.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/tor-and-https-1-300x232.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/tor-and-https-1.png 990w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\"><em>Who can still snoop on your connection with HTTPS, and what can they see?\u00a0(by The TorProject)<\/em><\/p>\n<\/div>\n<p>Now, the intermediaries only get access to the website reached and the user&#8217;s IP address. The web page name, its content, the logins are no longer exposed to whoever snoops between the user and the website. It&#8217;s also no longer possible to modify this data on the fly.<\/p>\n<p>The security gain is then huge, as it&#8217;s possible to transmit sensitive data in an authenticated way without being modified. This is possible thanks to a chain of trust established between the user software (a web browser, for instance) and a third-party who authenticated the service (a website, for instance).<\/p>\n<p>This third party is called a Certificate Authority (CA). There currently are a<a href=\"https:\/\/www.eff.org\/files\/colour_map_of_cas.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> lot <\/a>of different CAs and all of them need to strictly follow the guidelines in order to stay trusted by web browsers, operating systems, and other software.<\/p>\n<p>Once a service requests a certificate to be authenticated, the Certification Authority proceeds to a multiple-step process in order to verify the owner identity. If it&#8217;s successful, the service will be authenticated.<\/p>\n<h3>A widespread adoption<\/h3>\n<p>However, despite the huge benefit of using SSL\/TLS, anyone who requests a trusted certificate for a specific domain needs to regularly pay an expensive fee, which slows down the adoption rate.<\/p>\n<p>In 2014, a new non-profit Certificate Authority was created by the <a href=\"https:\/\/letsencrypt.org\/isrg\/\" target=\"_blank\" rel=\"noopener noreferrer\">ISRG<\/a> with the idea to provide trusted certificates for free for everyone. The adoption was huge:<a href=\"https:\/\/letsencrypt.org\" target=\"_blank\" rel=\"noopener noreferrer\">\u00a0Let&#8217;s Encrypt<\/a> has been publicly launched in 2016 and has <a href=\"https:\/\/letsencrypt.org\/stats\/\" target=\"_blank\" rel=\"noopener noreferrer\">already delivered more than 33M certificate since then, for more than 40M domains<\/a>.<\/p>\n<div id=\"attachment_18055\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/letsencrypt.org\/stats\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18055 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/le_certificate_issuance-600x266.png\" alt=\"Let's Encrypt Certificates Issued Per Day\" width=\"600\" height=\"266\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/le_certificate_issuance-600x266.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/le_certificate_issuance-300x133.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/le_certificate_issuance-195x85.png 195w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/le_certificate_issuance.png 850w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\"><em>Let&#8217;s Encrypt Certificates Issued Per Day<\/em><\/p>\n<\/div>\n<p>For the first time, <a href=\"https:\/\/www.google.com\/transparencyreport\/https\/metrics\/?hl=en\" target=\"_blank\" rel=\"noopener noreferrer\">more than 50% of total web page requests have been served over HTTPS<\/a> in early 2017 and it&#8217;s still climbing.<\/p>\n<div id=\"attachment_18053\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.google.com\/transparencyreport\/https\/metrics\/?hl=en\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18053 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/https_usage-600x136.png\" alt=\"Percentage of pages loaded over HTTPS\" width=\"600\" height=\"136\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/https_usage-600x136.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/https_usage-300x68.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/https_usage.png 992w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\"><em>Percentage of pages loaded over HTTPS &#8211; Google Transparency Report<\/em><\/p>\n<\/div>\n<p>This widespread adoption is definitely good news for security. However, the landscape evolves very quickly, with involved parties trying to fix the remaining problems\u2014and introduce new ones.<\/p>\n<h3>Web browsers pushing harder<\/h3>\n<p>In order to push the adoption much further, web browsers are also taking active actions.<\/p>\n<p>Recently, <a href=\"https:\/\/security.googleblog.com\/2016\/09\/moving-towards-more-secure-web.html\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> and <a href=\"https:\/\/blog.mozilla.org\/security\/2017\/01\/20\/communicating-the-dangers-of-non-secure-http\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mozilla<\/a> announced a new feature in their browsers (Chrome and Firefox, respectively): websites served over HTTP will be labeled as non-secure (whereas before HTTP websites used to be the norm and only websites served over HTTPS had a specific label):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-18057\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/firefox_served_http-300x209.png\" alt=\"\" width=\"300\" height=\"209\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/firefox_served_http-300x209.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/firefox_served_http.png 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-18056\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/chrome_served_http-300x118.png\" alt=\"\" width=\"300\" height=\"118\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/chrome_served_http-300x118.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/chrome_served_http-600x235.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/chrome_served_http.png 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>They also announced the end of <a href=\"https:\/\/blog.mozilla.org\/security\/2017\/02\/23\/the-end-of-sha-1-on-the-public-web\/\" target=\"_blank\" rel=\"noopener noreferrer\">support for the SHA1 algorithm<\/a>, which is still used by some Certificate Authorities despite <a href=\"https:\/\/security.googleblog.com\/2017\/02\/announcing-first-sha1-collision.html\" target=\"_blank\" rel=\"noopener noreferrer\">several flaws it suffers.<\/a><\/p>\n<p>Another step is the introduction of <a href=\"https:\/\/www.certificate-transparency.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Certificate Transparency<\/a>, the support of which will be mandatory for all Certificate Authorities from October 2017\u00a0<a href=\"https:\/\/datatracker.ietf.org\/doc\/rfc6962\/\" target=\"_blank\" rel=\"noopener noreferrer\">in order to<\/a>\u00a0very quickly detect wrongly issued certificates and malicious Authorities, thus, revoking them as quickly as possible.<\/p>\n<p>Last but not least, they are taking strong positions against Certificate Authorities that\u00a0don&#8217;t follow the rules and best practices: Google and Mozilla announced their intention to distrust the \u201c<em>Class 3 Public Primary CA<\/em>\u201d Symantec certificate due to several failures <a href=\"https:\/\/cabforum.org\/about-the-baseline-requirements\/\" target=\"_blank\" rel=\"noopener noreferrer\">to comply with the industry rules<\/a> and <a href=\"https:\/\/groups.google.com\/a\/chromium.org\/forum\/#!topic\/blink-dev\/eUAKwjihhBs%5B1-25%5D\" target=\"_blank\" rel=\"noopener noreferrer\">other more<\/a>\u00a0recent <a href=\"https:\/\/wiki.mozilla.org\/CA:Symantec_Issues\" target=\"_blank\" rel=\"noopener noreferrer\">security problems<\/a>. This will revoke the trusted chain and will trigger a warning for users visiting a service authenticated with this certificate and may even block them to visit the website depending on their configuration unless Symantec changes their practices or agree to comply with Google and Mozilla requests <a href=\"https:\/\/groups.google.com\/forum\/#!topic\/mozilla.dev.security.policy\/C45hQChFLyc\" target=\"_blank\" rel=\"noopener noreferrer\">which\u00a0may be<\/a> the case.<\/p>\n<h3>Security software playing nasty<\/h3>\n<div id=\"magicdomid274\" class=\"ace-line\"><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\">Despite all these actions to push more and more\u00a0 SSL\/TLS implementation best practices, a major issue still <\/span><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">persists<\/span><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\">.\u00a0<\/span><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\">Several antivirus software, middleboxes, or corporate appliances analyze web or mail connections to scan for malicious content. While it&#8217;s easy to achieve for clear-text traffic (like HTTP), it&#8217;s much more difficult to do so for SSL\/TLS traffic.<\/span><\/div>\n<div class=\"ace-line\"><\/div>\n<div id=\"magicdomid336\" class=\"ace-line\"><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\">As pointed by <\/span><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">the recent study <\/span><a href=\"https:\/\/zakird.com\/papers\/https_interception.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z i\"><i>&#8220;The Security Impact of HTTPS Interception&#8221;<\/i><\/span><\/a><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7 i\"><i>,<\/i><\/span><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\"> these solutions <a href=\"https:\/\/www.eff.org\/deeplinks\/2015\/02\/further-evidence-lenovo-breaking-https-security-its-laptops\" target=\"_blank\" rel=\"noopener noreferrer\">tend to behave <\/a><\/span><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">like<\/span><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\"> spyware<\/span><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\">\u00a0and<\/span> <a href=\"http:\/\/www.thesafemac.com\/avasts-man-in-the-middle\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\">play<\/span><\/a><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\">\u00a0<a href=\"https:\/\/twitter.com\/Fr33Tux\/status\/865628306535665664\" target=\"_blank\" rel=\"noopener noreferrer\">nasty<\/a><\/span><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\">\u00a0<a href=\"https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=978\" target=\"_blank\" rel=\"noopener noreferrer\">with<\/a><\/span><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\">\u00a0SSL\/TLS while they try to decrypt it &#8220;<\/span><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7 i\"><i>for security reasons&#8221;<\/i><\/span><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\">. As expected, it usually puts the user at risk while breaking the security chain, reducing the connection security, and reintroducing old security flaws.<\/span><\/div>\n<div class=\"ace-line\"><\/div>\n<div class=\"ace-line\"><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">Malware is seen to maliciously modify the system certificate root store (which stores the list of trusted certificates from known Certificate Authorities). They add a non-trusted certificate and set it as trusted, or remove known and legit certificate in order to break the connection to known services. The latter has <a href=\"https:\/\/forums.malwarebytes.com\/topic\/201505-runtime-error-at-49120\/#comment-1129148\" target=\"_blank\" rel=\"noopener noreferrer\">been seen very recently on our forum<\/a>:<\/span><\/div>\n<div class=\"ace-line\"><\/div>\n<div class=\"ace-line\">\n<div id=\"attachment_18087\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/forums.malwarebytes.com\/topic\/201505-runtime-error-at-49120\/?do=findComment&amp;comment=1129148\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-18087\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/certificates_untrusted_forum-600x275.png\" alt=\"List of certificates maliciously marked as untrusted by the system\" width=\"600\" height=\"275\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/certificates_untrusted_forum-600x275.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/certificates_untrusted_forum-300x137.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/certificates_untrusted_forum.png 1600w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">List of certificates maliciously marked as untrusted by the system<\/p>\n<\/div><\/div>\n<div id=\"magicdomid339\" class=\"ace-line\"><\/div>\n<div id=\"magicdomid3475\" class=\"ace-line\"><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">But as explained, several security software programs proceed in a very similar manner.\u00a0<\/span><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">The study has used browsers legit SSL\/TLS handshakes with some being knowingly intercepted by security software (and middlebox, corporate appliances) to be able to draw a comparison based on the relationship between the user agent and <a href=\"https:\/\/tools.ietf.org\/html\/rfc5246#section-7.4.1.2\" target=\"_blank\" rel=\"noopener noreferrer\">Client Hello messages<\/a>.<\/span><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">\u00a0They used portions of Cloudflare, Firefox update servers, and several popular e-commerces websites traffic in order to get a sufficient amount of data.<\/span><\/div>\n<div class=\"ace-line\"><\/div>\n<div id=\"magicdomid3691\" class=\"ace-line\"><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">The results are particularly explicit by themselves: 90% of connections to Firefox servers, 32% of connections to e-commerce&#8217;s websites, and 54% of Cloudflare connections have been observed to be less secure while being intercepted.<\/span><\/div>\n<ul>\n<li class=\"ace-line\">On 12 famous and widely used corporate middleboxes tested:\n<ul>\n<li class=\"ace-line\"><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">11 weaken connection security (compared to an up-to-date web browser).<\/span><\/li>\n<li class=\"ace-line\"><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">5\u00a0 introduce several MiTM flaws<\/span><\/li>\n<li class=\"ace-line\"><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">10 support RC4 ciphers (broken)<\/span><\/li>\n<li class=\"ace-line\"><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">2 support export-grade ciphers<\/span><\/li>\n<li class=\"ace-line\"><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">3 do not properly validate the certificates<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">On the various security software solutions and malware tested:<\/span>\n<ul>\n<li><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">10 introduce several flaws (CRIME, anonymous ciphers, no certificate validation, RC2, too short DH length)<\/span><\/li>\n<li><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">Some RCE vulnerabilities (triggered by malformed certificates) are regularly found <a href=\"https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=546&amp;can=1&amp;q=avast\" target=\"_blank\" rel=\"noopener noreferrer\">in some of them<\/a><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div class=\"ace-line\"><\/div>\n<h3 class=\"ace-line\">Conclusion<\/h3>\n<div id=\"magicdomid2588\" class=\"ace-line\"><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\">In short, even if only a few security software have seemed to properly handle SSL\/TLS interception without introducing several vulnerabilities, all of them decreased the overall security compared to an up-to-date web browser or email client. Even worse, most of the time-critical vulnerabilities otherwise fixed years ago have also been reintroduced.<\/span><\/div>\n<div class=\"ace-line\"><\/div>\n<div id=\"magicdomid335\" class=\"ace-line\"><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\">The updated HTTPS Everywhere rule we spoke about in<\/span><span class=\"author-a-oz75zz71zpz65z0z122zn1iz77zz74z9z79zz73zz78z\"> the<\/span><span class=\"author-a-z89zz85zbukxz69z8eexz90z6z81zz84z7\"> introduction is another step to help our users to stay secure while browsing our websites, as all our services are available with HTTPS. We try to stay up-to-date <a href=\"https:\/\/www.ssllabs.com\/ssltest\/analyze?d=malwarebytes.com\" target=\"_blank\" rel=\"noopener noreferrer\">with the best SSL\/TLS deployment practices<\/a>.<\/span><\/div>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/06\/https-everywhere\/\">HTTPS&#8230; Everywhere!<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/06\/https-everywhere\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Boursier| Date: Tue, 06 Jun 2017 14:00:43 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/06\/https-everywhere\/' title='HTTPS... Everywhere!'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/ssl_tls_blog.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We recently updated our redirections rule in HTTPS-Everywhere, a browser extension that automatically redirects you to the HTTPS version of the website you are trying to visit. Now is a good time for us to give a short overview of how important HTTPS is. We&#8217;ll also talk about a few major HTTPS-related events that happened lately.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/privacy-security-world\/\" rel=\"category tag\">Privacy<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/https\/\" rel=\"tag\">HTTPS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/privacy-awareness-week\/\" rel=\"tag\">privacy awareness week<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/protection\/\" rel=\"tag\">protection<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/security\/\" rel=\"tag\">security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vulnerability\/\" rel=\"tag\">vulnerability<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/06\/https-everywhere\/' title='HTTPS... Everywhere!'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/06\/https-everywhere\/\">HTTPS&#8230; Everywhere!<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11124,5897,12293,10432,714,10497,10467],"class_list":["post-7852","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-https","tag-privacy","tag-privacy-awareness-week","tag-protection","tag-security","tag-security-world","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7852"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7852\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}