{"id":27524,"date":"2014-11-19T23:42:06","date_gmt":"2014-11-20T04:42:06","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27524"},"modified":"2014-11-19T23:42:06","modified_gmt":"2014-11-20T04:42:06","slug":"https-everywhere-electronic-frontier-foundation","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/https-everywhere-electronic-frontier-foundation.php","title":{"rendered":"HTTPS Everywhere | Electronic Frontier Foundation"},"content":{"rendered":"<p><p>  HTTPS Everywhere is produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. Many sites  on the web offer some limited support for encryption over  HTTPS,  but make it difficult to use. For instance, they may default to  unencrypted HTTP, or fill encrypted pages with links that go back  to the unencrypted site. The HTTPS Everywhere extension fixes  these problems by using a clever technology to rewrite  requests to these sites to HTTPS.<\/p>\n<p>  Information about how to access the project's Git repository and  get involved in development is here.<\/p>\n<p>  Webmasters and prospective contributors: Check  the HTTPS  Everywhere Atlas to quickly see how existing HTTPS Everywhere  rules affect sites you care about!<\/p>\n<p>    Sadly, many sites still include a lot of content from third    party domains that is not available over HTTPS. As always, if    the browser's lock icon is    broken or carries an exclamation mark, you may remain    vulnerable to some adversaries that use active attacks or    traffic analysis. However, the effort that would be required to    eavesdrop on your browsing should still be usefully increased.    Update: in recent versions of Firefox, Mozilla has    removed the broken padlock indicator. Now, the only difference    between a secure and insecure HTTPS deployment is the blue or    green tint on the left of the address bar for secure    deployments  <\/p>\n<p>    Answers to common questions may be on the frequently asked questions page.  <\/p>\n<p>    HTTPS Everywhere can protect you only when you're using    sites that support HTTPS and for which HTTPS Everywhere include    a ruleset. If    sites you use don't support HTTPS, ask the site operators to    add it; only the site operator is able to enable HTTPS. There    is more information and instruction on how server operators can    do that in the EFF article How to Deploy HTTPS    Correctly.  <\/p>\n<p>    Webmasters and prospective contributors: Check    the HTTPS    Everywhere Atlas to quickly see how existing HTTPS    Everywhere rules affect sites you care about!  <\/p>\n<p>    You can help us test forthcoming site support and new features    by installing the development branch of    the extension. HTTPS Everywhere uses small ruleset files to    define which domains are redirected to https, and how. If you'd    like to write your own ruleset, you can find out how to do that    here. Information    about how to access the project's Git repository and get    involved in development is here. Send feedback on this    project to the https-everywhere AT eff.org mailing list. Note    that this is a public and publicly-archived mailing list. You    can also subscribe.    Send new rewrite rules or fixes to existing rewrite rules to    the https-everywhere-rules AT eff.org mailing list. Note that    this is a public and publicly-archived mailing list. You can    also     subscribe.  <\/p>\n<p>    Our code is partially based on the     STS implementation from the groundbreaking NoScript project (there are other    STS implementations    out there, too). HTTPS Everywhere aims to have a simpler user    experience than NoScript, and to support complex rewriting    rules that allow services like Google Search and Wikipedia to    be redirected to HTTPS without breaking anything. It also    handles situations like https:\/\/ pages that redirect back to    http:\/\/ in a reasonable manner. In an ideal world, every web    request could be defaulted to HTTPS. Unfortunately, there's no    way to know that what you get from requesting    <a href=\"https:\/\/www.domain.com\/page\" rel=\"nofollow\">https:\/\/www.domain.com\/page<\/a> is the same as what you get from    requesting <a href=\"http:\/\/www.domain.com\/page\" rel=\"nofollow\">http:\/\/www.domain.com\/page<\/a>. So the only way to    switch every page to https is to fetch the page    insecurely first. There is a Chrome extension called     KB SSL Enforcer which attempts to take that approach, but    it does not appear to be implemented securely; when we tested    it, it seemed to always use http before https, which means that    your surfing habits and authentication cookies are not    protected (this may be a limitation of the Chrome Extensions    framework).  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.eff.org\/https-everywhere\" title=\"HTTPS Everywhere | Electronic Frontier Foundation\">HTTPS Everywhere | Electronic Frontier Foundation<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> HTTPS Everywhere is produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-27524","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27524"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27524"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27524\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}