{"id":16264,"date":"2018-10-19T10:40:21","date_gmt":"2018-10-19T10:40:21","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/"},"modified":"2018-10-19T10:40:21","modified_gmt":"2018-10-19T10:40:21","slug":"you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/","title":{"rendered":"You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone&#8217;s web privacy"},"content":{"rendered":"<p><strong class=\"trailer\">Analysis<\/strong> Transport Layer Security underpins much of the modern internet. It is the foundation of secure connections to HTTPS websites, for one thing. However, it can harbor a sting in its tail for those concerned about staying anonymous online.<\/p>\n<p>Privacy advocates have long warned about the risks posed by various forms of web tracking. These include cookies, web beacons, and <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.w3.org\/wiki\/images\/7\/7d\/Is_preventing_browser_fingerprinting_a_lost_cause.pdf\">too many forms of fingerprinting<\/a> to name.<\/p>\n<p>Awareness of the issue has helped a bit. Apple recently rolled out <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/webkit.org\/blog\/8311\/intelligent-tracking-prevention-2-0\/\">improved tracking protection<\/a> in Safari for macOS Mojave and iOS 12. Firefox earlier this year debuted an anti-tracking add-on called <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/03\/28\/firefox_thinks_inside_the_box_for_facebook\/\">Facebook Container<\/a>, among other improvements. And browsers like Brave and Tor Browser continue to offer more extensive privacy capabilities.<\/p>\n<p>The privacy risks associated with web tracking, however, persist, and now it appears there&#8217;s yet another mechanism for following people online. Blame researchers from the University of Hamburg in Germany for the latest expansion of the privacy attack surface.<\/p>\n<p>In <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/arxiv.org\/pdf\/1810.07304.pdf\">a paper<\/a> distributed through ArXiv this week, computer science boffins Erik Sy, Hannes Federrath, Christian Burkert, and Mathias Fischer describe a novel tracking technique involving Transport Layer Security (<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.ietf.org\/html\/rfc5077\">TLS<\/a>) session resumption.<\/p>\n<h3 class=\"crosshead\"><span>Tricky negotiations<\/span><\/h3>\n<p>TLS (SSL in an earlier incarnation) should be widely familiar as the cryptographic protocol used to keep web communication protected as it travels between client and server. The latest version is 1.3.<\/p>\n<p>Establishing a TLS connection, say, when visiting a HTPPS website, involves some back-and-forth negotiation over the network. So it makes sense to have a way to resume previously a established session with less ritual: TLS session resumption.<\/p>\n<p>The techniques for doing so vary between TLS 1.3 and older versions of the spec \u2013 0-RTT\/1-RTT (round-trip time) via pre-shared keys (PSK) represents the latest mechanism while the legacy approach involves sessions IDs and session tickets.<\/p>\n<p>Fine distinctions aside, these techniques are a bit like getting one&#8217;s hand stamped at some event in order to leave and then return without paying the cost of entry a second time. Well, not really. But let&#8217;s just leave it at that to avoid a discussion of TLS handshake arcana.<\/p>\n<p>The point is that session resumption relies on the identifier passed to the client device during the initial handshake. And because this identifier \u2013 session ID, session ticket or PSK identity \u2013 persists in the browser&#8217;s TLS cache, it can be tracked like any other digital identifier.<\/p>\n<p>This is less of an issue for browsers running on desktop computers, provided the user restarts the browser every so often. But the researchers observe that mobile devices may go days or even weeks (given recharge time) without a browser restart.<\/p>\n<p>Session resumption identifiers have varying expiration times. Servers can provide a non-binding <code>ticket_lifetime_hint<\/code> field specifying the identifier&#8217;s lifetime in seconds as a 32-bit unsigned integer. That could allow a lifetime of about 68 years. However, TLS 1.2 and TLS 1.3 call for more restricted ticket lifetimes, 24 hours and 7 days respectively.<\/p>\n<h3 class=\"crosshead\"><span>It could be worse but still isn&#8217;t good<\/span><\/h3>\n<p>Sy, Federrath, Burkert, and Fischer found that 80 per cent of the TLS session ticket-enabled websites among the Alexa Top Million set lifetime hints of ten minutes or less. About 10 per cent of the remainder set lifetime hints of at least 24 hours.<\/p>\n<p>They note that Facebook and Google, due to their behavioral ad businesses, specify longer session resumption ticket lifetimes than most. Facebook&#8217;s lifetime hint setting of 48 hours is higher than 99.99 per cent of all session ticket hints found. Google&#8217;s 28 hour value exceeds 97.13 per cent of Alexa&#8217;s top million websites.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/01\/27\/infosec_98457667.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"TLS\"\/><\/p>\n<h2 title=\"You thought you were buying better security, right?\">TLS proxies? Nah. Truthfully Less Secure &#8216;n&#8217; poxy, say Canadian infosec researchers<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/09\/27\/tls_proxies_still_mostly_rubbish_say_canadian_infosec_boffins\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>But the expiration of a session resumption ticket doesn&#8217;t necessarily remove the ability to track a user if a correlated identifier can be placed before then.<\/p>\n<p>When a client attempts to resume a session, it transmits its TLS session resumption identifier to the server regardless of whether the session is resumed or rejected, the researchers observe. This revealed data can then be associated with a newly established session by the same user.<\/p>\n<p>The researchers observe that a website can issue a new session identifier on every visit and &#8220;thus track a user indefinitely as long as the time between two visits does not exceed the session resumption lifetime of the user&#8217;s browser.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>Kinda lingers<\/span><\/h3>\n<p>The default configurations of most web browsers, however, mitigate the risk. Among the 45 browsers surveyed, two-thirds only allowed session resumption lifetimes of up to 60 minutes for the session ID and session ticket mechanisms.<\/p>\n<p>Even so, tracking a user for more than a week appears to be possible with most browsers.<\/p>\n<p>&#8220;Our results indicate that with the standard setting of the session resumption lifetime in many current browsers, the average user can be tracked for up to eight days,&#8221; the paper says. &#8220;With a session resumption lifetime of seven days, as the recommended upper limit in the draft for TLS version 1.3, 65 per cent of all users in our dataset can be tracked permanently.&#8221;<\/p>\n<p>The researchers singled out the three privacy-friendly browsers \u2013 JonDoBrowser, Orbot, and Tor Browser \u2013 for their lack of session resumption support. Four other browsers \u2013 360 Secure Browser, Konqueror, Microsoft Edge, and Sleipnir \u2013 restrict session resumption support for third parties.<\/p>\n<p>To mitigate the risk of tracking via TLS session resumption identifiers, the boffins recommend that the seven-day session resumption time specified in TLS 1.3 be reduced to 10 minutes and that browser makers address third-party tracking scenarios.<\/p>\n<p>&#8220;The most effective technique is to disable TLS session resumption in browsers completely,&#8221; they conclude.<\/p>\n<p>Crucially, don&#8217;t give up on TLS and HTTPS. They are invaluable for staying secure on today&#8217;s internet. Browser and website developers, though: please have a rethink about session resumption. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1787\/-6625\/following-bottomlines-journey-to-the-hybrid-cloud?td=wptl1787\">Following Bottomline\u2019s journey to the Hybrid Cloud<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/10\/19\/tls_handshake_privacy\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Never-closed browsers and persistent session tickets make tracking a doddle Analysis\u00a0 Transport Layer Security underpins much of the modern internet. It is the foundation of secure connections to HTTPS websites, for one thing. However, it can harbor a sting in its tail for those concerned about staying anonymous online.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":16265,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-16264","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone&#039;s web privacy 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone&#039;s web privacy 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-19T10:40:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone&#8217;s web privacy\",\"datePublished\":\"2018-10-19T10:40:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\\\/\"},\"wordCount\":972,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\\\/\",\"name\":\"You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone's web privacy 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy.jpg\",\"datePublished\":\"2018-10-19T10:40:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone&#8217;s web privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone's web privacy 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/","og_locale":"en_US","og_type":"article","og_title":"You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone's web privacy 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-19T10:40:21+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone&#8217;s web privacy","datePublished":"2018-10-19T10:40:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/"},"wordCount":972,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/","url":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/","name":"You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone's web privacy 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy.jpg","datePublished":"2018-10-19T10:40:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/you-like-https-we-like-https-except-when-a-quirk-of-tls-can-smash-someones-web-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone&#8217;s web privacy"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=16264"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16264\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/16265"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=16264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=16264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=16264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}