TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

HTTPS isn’t always as secure as it seems

23 点作者 okneil大约 6 年前

6 条评论

hannob大约 6 年前
I read the complete article. I read the page of the researchers that is linked. I know how this stuff works.<p>I still have no idea what they have found. Far too little info to estimate how relevant this is.
评论 #19544963 未加载
_bxg1大约 6 年前
Interesting. Sounds like browser maintainers need to detect the patch level of a server and adjust the padlock icon accordingly. I don&#x27;t know if this is as simple as a version number check, or if sites would need to be probed for vulnerabilities. In the latter case, maybe a global shared registry needs to be created that can be queried by browsers and updated by web admins (not on the honor system, obviously; after updating their server they could just ask it to re-audit them).<p>Alternately, an HTTPS implementation that can silently update itself without admin permissions like browsers can. The web moves too fast for manual security patches.
评论 #19544991 未加载
mholt大约 6 年前
So, yeah -- this is a really hard problem: mapping technical characteristics such as TLS properties and domain name similarities to actual threats.<p>That&#x27;s one of the reasons why, in my thesis (which I defend in... 1 week!), I propose replacing replacing security indicators with risk indicators [1]. I think technical properties of a web page, in conjunction with the context of specific interactions, can be used to determine whether the interactions might be risky. By informing users of risks they may be taking, they feel more confident making their own trust decisions.<p>(Meanwhile on the back-end: as a web server developer, I&#x27;m trying to find ways to make it easier to do upgrades when vulnerabilities in protocols are fixed, etc. It&#x27;s also hard.)<p>[1]: <a href="https:&#x2F;&#x2F;twitter.com&#x2F;mholt6&#x2F;status&#x2F;1112748525413031936" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;mholt6&#x2F;status&#x2F;1112748525413031936</a>
herodotus大约 6 年前
As far as I can tell, this article is content free.
ravenstine大约 6 年前
If there are ways to detect TLS vulnerabilities, it&#x27;d be nice to know that in the browser if that&#x27;s not already possible. I would simply not visit sites that don&#x27;t properly encrypt, and would even go as far as to block them.
zelon88大约 6 年前
In other news, Wired obviously still thinks that breaking the browser&#x27;s back button is a valid way to boost conversions.