Mozilla Firefox has taken HTTPS security one step further with HTTPS-Only Mode. To verify whether your browser has established a secure connection, you can navigate to the address bar and make sure that the web address begins with “ (as opposed to the insecure “ In addition, most modern browsers provide a padlock icon next to the address bar for those who can see it when a secure connection has been established. Failing to establish a secure connection could leave your data vulnerable to hackers, identity thieves, and other malicious actors. This is especially true if you plan to communicate your credit card number, address, or other sensitive information to a trusted website. One particularly important place to be vigilant about security is in your browser. Mozilla’s announcement reminds us that while the momentum is with it, this one has a way to roll yet.įollow on Twitter for the latest computer security news.Maintaining digital security is a multifaceted and complex process, but it’s also essential in the times in which we live. The drag might be simply that the HTTPS movement has turned into a big undertaking, assertively pushing HTTPS by the front door and a fragmented series of secure contexts by the back. Google-centrism might be another factor, although given that Microsoft’s IE and Edge are the only major browsers that don’t yet support the idea, this is probably of minor importance. So we will have to monitor the degree of breakage and balance it with the security benefit. Removing features from the non-secure web will likely cause some sites to break. ![]() Mozilla is set to start using secure contexts for existing features too, on a “case-by-case basis.” The catch is that turning off support for HTTP in web technologies won’t necessarily be quick or without complication. Since then, the whole thing has turned into a W3C draft proposal, another cog in the multi-dimensional drive to make all traffic between web users and websites encrypted, including the possibility of DNS queries in the future. Mozilla has busied itself doing the same for Firefox. Realising all this was becoming an issue as the web got more complicated, Google kicked off the secure contexts initiative in 2014, gradually adding these requirements to Chrome. Wouldn’t it be simpler to make all sites use HTTPS and be done with it?Īlthough HTTPS secures the browser’s connection to a website, a non-HTTPS function could still be opened in a separate window without that insecurity being obvious to the user. These could all work over HTTP, of course, but that would represent a security risk that attackers could exploit to steal credentials, track users, and intercept data using man-in-the-middle ruses. (Another three – the AppCache API, Device motion/orientation, and Fullscreen – will follow in time.) Service Workers used for background sync and notification.Google’s Accelerated Mobile Pages (AMP).Google’s Brotli web compression algorithm.These mostly hidden functions currently include: The principle of secure contexts is an incredibly simple one – that certain powerful web capabilities and APIs (whose risks users are often barely aware of) should be forced to work over HTTPS. ![]() ![]() This could be about to change thanks to the publicity generated by the much better-known campaign by Google and others to migrate websites from insecure HTTP connections to encrypted HTTPS. The odd thing is that while secure contexts (also called ‘secure origins’) matter a lot to end user security, almost nobody beyond web devs has ever heard of the mechanism or pondered why it might be a big deal. This isn’t a surprise – Mozilla mandated that security-sensitive geolocation be added as a secure context last March – but the signal is still significant.Īll the building blocks are now in place to quicken the adoption of HTTPS and secure contexts, and follow through on our intent to deprecate non-secure HTTP.Įveryone involved in standards development is strongly encouraged to advocate requiring secure contexts for all new features on behalf of Mozilla. Mozilla’s embrace of HTTPS, the secure form of HTTP, has ratcheted up a notch with the news that Firefox developers must start using a web security design called ‘secure contexts’ “effective immediately.”
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |