Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Google Chrome Privacy Security

Google Chrome Pushes For User Protection With 'Not secure' Label (axios.com) 85

In an effort to force websites to better protect their users, the Chrome web browser will label all sites not encrypted traffic as "Not secure" in the web address bar, Google announced Thursday. From a report: Encrypted traffic allows users to access data on a website without allowing potential eavesdroppers to see anything the users visit. HTTPS also prevents meddlers from changing information in transit. During normal web browsing, Google currently displays a "Not secure" warning in the next to a site's URL if it forgoes HTTPS encryption and a user enters data. Now the browser will label all sites without HTTPS encryption this way.
This discussion has been archived. No new comments can be posted.

Google Chrome Pushes For User Protection With 'Not secure' Label

Comments Filter:
  • by iamhassi ( 659463 ) on Thursday February 08, 2018 @03:32PM (#56091245) Journal
    This is silly. Google is saying every website needs to be https. That's not true and is a waste of money and time to make every site https
    • by XanC ( 644172 )

      First, I think yes, it does. Otherwise it will be snooped or manipulated.

      Second, they're just making it clearer when a site isn't https. Not saying every site needs to be secure.

      • by Anonymous Coward

        With your browser trusting 600 CAs by default it certainly has absolutely no value without DNSSEC and DANE.

        • by Kjella ( 173770 )

          With your browser trusting 600 CAs by default it certainly has absolutely no value without DNSSEC and DANE.

          All it takes is a few webmasters to take note of their security certificate fingerprint and check it from a random home/mobile connection or proxy and you'd see alarm bells go off if someone was trying to MITM the world. With HTTP they can just snoop on a fiber optic cable and nobody would know. So when it comes to protecting everyday people visiting everyday sites I think it has an effect.

        • by Maritz ( 1829006 )

          has absolutely no value without DNSSEC and DANE.

          "If it isn't perfect, it's worthless" - This AC

      • Re: (Score:3, Interesting)

        by Anonymous Coward

        HTTPS security doesn't matter if I don't trust the content anyway. (I could be looking at https://sloashdot.org/ for example. Or even the genuine slashdot.org and it could still be utter nonsense. It really only matters for the small handful of sites that I visit where the identity of that site would make a material difference to me (bank, tax dept).

        Given that, manipulation is a non-issue. I could be looking at manipulated version of slashdot and I wouldn't trust it any more or less. Snooping is a bit

        • One of the obvious problems with this whole thing, is that what https does is somewhat more technical than the kinds of things laymen know about, and Google wants to "dumb down" the distinction in the UI to something succinct. So they chose one single word, "secure" instead of "this conversation is believed (to a somewhat degree of confidence) to be though party X's webserver (or with them plus other parties that they consented to be included), and oh by the way, we also encrypted it too."

          It's "wrong" but

        • If it said "not encrypted" that would at least be *true*.

          Marking sites as "not secure" vs "secure" based on using HTTPS is simply a lie. The usage of HTTPS is only slightly correlated with security. It's the equivalent of labeling people "tall" if they're black, and "short" if they are Hispanic. In general, the average height of Hispanic people tends to be lower than the average height of black people, but assuming someone is tall because they are black is stupid, and the label would be misleading almost

          • by RonVNX ( 55322 )

            That's Google. Google has a huge problem with facts and truth, and dumbing everything down to the point of being counter-productive.

      • by Anonymous Coward

        Second, they're just making it clearer when a site isn't https. Not saying every site needs to be secure.

        Then what was the point of phrasing it as "Not Secure"? That you should feel good knowing the site is "insecure"? That you shouldn't think that Clueless Users won't suddenly say "why isn't it secure" and start demanding "security"?

        They phrased it that way precisely to make users do that. Encrypt All Of The Things!!!! Never mind that doing so renders using an alternative DNS utterly impossible what with a

    • by ArchieBunker ( 132337 ) on Thursday February 08, 2018 @03:35PM (#56091259)

      Don't the fed have all the SSL master keys anyhow?

      • Re: (Score:2, Informative)

        by Anonymous Coward

        Short answer; Yes.

        Long answer; hell Yes... except all those self-signed certs chrome/google seem dead set on crippling even more for browser use.

        • by amorsen ( 7485 )

          I generate my own key and use letsencrypt to certify it. The key does not leave my server.

          The feds can force any number of certificate authorities to generate a certificate that matches mine, with a new private key. They can do exactly the same if I had a self-signed certificate.

          They cannot, without doing a targeted attack and breaking into my server, get the actual private key that my site uses. Again, precisely the same as a self-signed certificate.

          There is no security advantage to using a self-signed cer

    • by nitehawk214 ( 222219 ) on Thursday February 08, 2018 @03:37PM (#56091271)

      So you don't mind a 3rd party knowing the content of each webpage you have visited?

      • by Anonymous Coward

        nope... except for pages where I actually log in I couldn't care less. There should rather be a warning if there is any 3rd party content, like AdWords or Analytics...

      • Sniffing is a minor concern. The bigger problem, by far, are third party tackers. This is more an attempt by Google to monopolize tracking data than preventing it.

        Also, it only protects knowing which specific page I visit on a site (they can tell from the IP address what website I'm visiting, right?). And that's unnecessary on many or most sites. On , WebMD pages matter, but when you go to XKCD?

      • Comment removed based on user account deletion
    • a waste of money and time to make every site https

      Let's Encrypt makes it easy and free for every website to be https.

      • Let's Encrypt makes it easy and free for every website to be https.

        This is true of public websites. It is not true of private websites hosted by web servers on a home local area network. Examples include the configuration interface of your router or printer. These have no certificate because they have no fully-qualified domain name (FQDN).

        Or is everyone who operates a LAN at home expected to already own a domain?

        • by kqs ( 1038910 )

          I'm confused: are you saying that it is a problem if your printer config page says "not secure" in the browser bar?

          GP should have said "every website that Google will index" rather than "every website", but that seemed understood to me.

          • by LesFerg ( 452838 )

            It gets annoying whenever I access a local device on my network and chrome presents it's warning page, then I have to click on a link to expand some extra text, which has a link to let me continue to the intended destination.

            They should at either have a maintainable list of sites I deem trusted, or be able to recognize local network devices and shut the fuck up when I am accessing them.

            My Octoprint service is one example. It runs on a raspberry pi on my workbench and I use it's web interface from my PC or p

            • by tepples ( 727027 )

              They should at either have a maintainable list of sites I deem trusted, or be able to recognize local network devices and shut the fuck up when I am accessing them.

              The latter leads to security failure, as your browser would trust "local network devices" operated by an attacker on the open WLAN at a coffee shop.

              The sad thing is I am starting to prefer other browsers which don't have these annoying features.

              Which might these be? The same features you decry in Google Chrome are likely to show up in other derivatives of Chromium, and Firefox is implementing the same features.

          • are you saying that it is a problem if your printer config page says "not secure" in the browser bar?

            I'm saying it's a problem if I can't, for example, view media that I have stored on my NAS box because its presentation in the browser relies on JS APIs that are reserved for secure contexts [w3.org].

    • by Richard_at_work ( 517087 ) on Thursday February 08, 2018 @03:49PM (#56091351)

      Every site has *something* to lose - if it's not user credentials or personally identifiable information, then it's reputation or simply the ability for a third party to inject ads or crypto mining scripts into the page.

      We have all seen the fall out of ISPs injecting ads into pages - Comcast and others have done it - so if you want to be *certain* your page reaches your audience as you intend them to receive it, http is no longer good enough (and hasn't been for years).

    • Re: (Score:2, Insightful)

      by thegarbz ( 1787294 )

      This is silly. Google is saying every website needs to be https. That's not true and is a waste of money and time to make every site https

      They are doing nothing of the sort, they are only finally putting HTTP in the correct light: It's not frigging secure and never has been. The fact that so far we have put more effort into poorly encrypted but none the less far more secure than HTTP.

      It made no sense. This finally does.

    • This is silly. Google is saying every website needs to be https. That's not true and is a waste of money and time to make every site https

      I completely disagree. Companies that run websites should already be serving their websites via https. This will probably push companies who aren't using encryption to start or face backlash from users. It is very easy to make use of https! Any competent website administrator should already know how to do this. It isn't even an issue of money either. Let's Encrypt [letsencrypt.org] offers free certificates so I don't want to hear that it is a time and money issue.

      • by tlhIngan ( 30335 ) <slashdot&worf,net> on Thursday February 08, 2018 @04:26PM (#56091567)

        It isn't even an issue of money either. Let's Encrypt offers free certificates so I don't want to hear that it is a time and money issue.

        It's a reputation issue. Given Let's Encrypt has issued over 14,000 paypal phishing certificates, one would think you should revoke Let's Encrypt certificates. After all, if Symantec, Comodo or others issued those, we'd be calling for blood.

        The only reason we aren't is because Let's Encrypt has big names like EFF and Mozilla behind them. But all the scammers are basically dragging them through the mud - are your EFF donations being used to scam poor old ladies out of their money? Is scamming people really the goal of EFF and Mozilla?

        Heck, it's actually kind of funny because a new exploit opened up on sites using Let's Encrypt, because they have a well-known directory that's being used to hide cryptocurrency miners and other things, too.

        Maybe if there was a way to grade the quality of a certificate - Let's Encrypt can be made low, sites that charge with a real valid billing address (i.e., used a credit card, as opposed to bitcoin) can be higher rated because there is accountability down the line - including down to a real name and address.

        • by amorsen ( 7485 )

          There is a way to grade. If you want actual validation, you need an extended validation certificate.

          Any other type of certificate is just a way to scam you out of your money -- they do not verify anything except the fact that you aren't piss-poor. If you think a car charge provides any verification, I give you How to use prepaid debit cards [itstactical.com].

          If anything, it should be forbidden to charge money for a certificate that isn't extended validation. However, with Let's Encrypt available, the market hopefully sorts i

          • Extended validation is a sham too. I got an EV code signing certificate recently for signing windows drivers. The only verification was that the CA called my prepaid phone number to ask if I am indeed a hardware engineer working for xxx. I said yes, and got the certificate. I could easily have lied.

        • GoDaddy, Gandi, Namecheap, and other registrars have registered over 14,000 paypal phishing certificates. Should we call for registrars' blood too?

        • by AmiMoJo ( 196126 )

          The certs that Let's Encrypt issues don't certify identity. If you are assuming that they verify the identity of the site owner you made a mistake.

          Let's Encrypt check that the key belongs to a person with the ability to edit the site. That's it. You can be reasonably sure your communications with that she can only be read by people who can edit the site, that's it.

        • LetsEncrypt is not a low-grade certificate. It is a domain validated certificate. It offers the exact same encryption option as any other certificate does. If anything, a shorter renewal period is an improvement to turn over a compromised certificate faster. It does not offer low security, and labeling it as such is incorrect.

          EV certificates are a way to sell trust, but they sadly do very little to actually verify the company. A fake document later and you have your certificate. Plus youâ(TM)re assumi

      • It isn't even an issue of money either. Let's Encrypt offers free certificates

        Only to a domain owner. Neither Let's Encrypt nor any other CA included in the browsers' default certificate store offers any certificates for use with (say) .local, the TLD reserved for use with multicast DNS. What certificate should (say) the configuration interface of your home NAS use?

    • It prevents your ISP from injecting crap into your pages, like Comcast has been known to do. [gizmodo.com]
    • No point modding up a +5. How about the 30 or so websites on my LAN of things? No internet involved at all. Faking certs for that would be just plain stupid. Seems the whole world is set up for stupid consumers only - no one creates content, right? That's why asymmetric DSL is such a hit, right?
  • Normal users are not going to see nor are they going to care.
  • "WARNING! Secure label is inaccurate and does not apply to google.com, facebook.com, youtube.com, or any other giant site with backdoors for government monitoring as part of the Prism panopticon."

    "WARNING! Does not apply to any website run on computers with Windows, with backdoors for government."

    "WARNING! Does not apply to any computer with hardware from the US or China, with special chips or standard chips with backdoors for government."

    "Don't worry, they won't abuse it, even though human history has n

    • by kqs ( 1038910 )

      When you say "they won't abuse it", are you talking about some specific "they"? Or just a general whining that there is no perfect security plus everyone in power sometimes acts like shit? Cause I think we all agree with the second one already.

    • "Don't worry, they won't abuse it, even though human history has no examples where it isn't abused by those in power against their political opponents to remain in power."

      While this may be true, it is something of an overstatement - because you can't show it to be true for recent stuff. It take a while for info to leak out.

      Make it something like:

      Don't worry, they won't abuse it, even though human history has no examples (more than 30 years old) where it wasn't shown, within 30 years after the event, that i

A complex system that works is invariably found to have evolved from a simple system that works.

Working...