Two different articles caught my attention this past week, both of them concerning secure sites. In the light of the recent initiative from Google to encourage all site owners to migrate to secure connections, a reminder that these can be exploited to breach user privacy and security just as normal, unencrypted connections. I stand by my original reaction that implementing HTTPS on small sites and blogs carries a lot of complications with little benefit.
Update: another example, this time from a major PC manufacturer:
The critical threat is present on Lenovo PCs that have adware from a company called Superfish installed. As unsavory as many people find software that injects ads into Web pages, there's something much more nefarious about the Superfish package. It installs a self-signed root HTTPS certificate that can intercept encrypted traffic for every website a user visits. When a user visits an HTTPS site, the site certificate is signed and controlled by Superfish and falsely represents itself as the official website certificate.
Post a Comment