HTTPS Now allows users to contribute information about how websites use HTTPS, including if the site uses HTTPS on all pages, serves mixed content, etc. If you don't know what these terms mean, just click on the question mark at the top of each column. To edit an entry, click on the edit link in each row. To see more info about a site, click on the arrow in the Show Notes column.

Does the website use HTTPS?

HTTPS (HTTP Secure) is the secure version of the web's HTTP protocol. When sites use HTTPS, users' requests to the site, as well as the site's replies, are encrypted. This makes it harder for eavesdroppers to know what a user is doing on the site, including what the user is reading or writing or which parts of the site the user is communicating with. Using HTTPS is GOOD. Sites should do this.

How to tell

Is the website free of mixed content?

Mixed content is a problem that occurs when a site is using HTTPS for a page as a whole, but some elements on that page, such as an image, are not encrypted with HTTPS. This can let someone eavesdrop on or tamper with that part of the page. For instance, if a news or encyclopedia site doesn't encrypt images, an eavesdropper could see what images are loaded and potentially deduce which news or encyclopedia articles you're reading. If a webmail site doesn't encrypt its Javascript (or parts of the page that can load Javascript), an eavesdropper could tamper with the site's Javascript code and reprogram it to leak unencrypted copies of your e-mail.

Sites that have mixed content are also potentially vulnerable to attack software like Firesheep. This vulnerability may exist even if a particular attack program doesn't appear to work against a particular web site with some minor technical changes. Having pages free of mixed content is GOOD. Sites should do this.

Note: different browsers have different ways of determining whether there is mixed content on a page (i.e., insecure elements on an otherwise secure page), and therefore one browser might fully trust a site while another will give you a warning. So, for example, going to https://www.youtube.com in Chrome triggers a mixed content warning, but visiting this site in Firefox does not. That said, if any browser is giving you a mixed content warning, there’s probably a reason why.

How to tell

Is HTTPS in use for all pages on the entire site?

A site can provide the best protection for its users by using HTTPS on all parts and elements of the site, without exception. Among other benefits, this makes it harder for an eavesdropper to gather clues about how a user is using a site, such as which parts of the site they are using. It also prevents attackers from corrupting or altering information presented on the site in ways that could confuse or mislead users, or draw them away from the real site to counterfeit versions. Using HTTPS on all pages is GOOD. Sites should do this.

How to tell

Is HTTPS in use on all pages where a user enters personally identifying information?

Some sites use HTTPS for some pages but not for others (e.g. login and payment pages are encrypted, but browsing is not). This means that the level of protection provided by those sites is inconsistent and leaves you vulnerable to attack. Using HTTPS on pages where users enter personal information is GOOD. Sites should do this.

How to tell

Does the website use secure cookies?

For sites that require users to log in, the site may set a cookie in your browser containing authentication information that helps the site recognize that requests from your browser are allowed to access information in your account.

If the site uses HTTPS, the correct security practice is to mark these cookies "secure", which prevents them from being sent to a non-HTTPS page, even at the same URL. If the cookies are not "secure," an attacker can trick your browser into going to a fake non-HTTPS page; when your browser sends the cookies, the eavesdropper can record them and then use them to log into your account. Using secure cookies is GOOD. Sites should do this.

How to tell

Is the SSL certificate valid?

Sites that use HTTPS present a cryptographic certificate to your browser whenever you access them. It shows that your connection to the site is not being tampered with. The certificate process is important because tampering and eavesdropping may not be otherwise apparent. For this process to work correctly, all sites should present a current, valid certificate from a mainstream certificate issuer, and that certificate should correctly refer to the actual site name through which the site is being accessed. If the site presents a certificate that's expired, invalid, unrecognized by mainstream browsers, doesn't refer to the name through which the site is accessed, etc., browsers can't be sure that the connection is really secure. Using a valid certificate is GOOD. Sites should do this.

How to tell

What is the key strength?

The cryptographic algorithms that sites use to protect information as it travels over the Internet come in various versions and strengths. Using up-to-date and strong versions of these algorithms provides better protection against sophisticated attackers who might be able to break weaker versions, some day, if not now. Although there are several different features of a site's encryption that are potentially relevant, we are choosing to document just one of these: the key length (or strength), which is a numerical measurement of the size (and thus resistant to some attacks) of the site's public encryption key. Using a longer key length is GOOD. Sites should use the longest key length that is practical for their situation. According to U.S. government security recommendations, sites should now begin using keys with a minimum length of 1024 bits.

How to tell

Does the website use HSTS? (HTTP Strict Transport Security)

HSTS (HTTPS Strict Transport Security) is a new standard by which a web site can request that users automatically always use HTTPS when communicating with that site. The users' browsers will remember this request and automatically turn on HTTPS when connecting to the site in the future, even if the user didn't specifically ask for it. Using HSTS is GOOD. Sites should do this.

How to tell
Name Uses HTTPS on Some Pages Free of Mixed Content Uses HTTPS on All Pages All Identifying Information Encrypted Only Uses Secure Cookies Has a Valid SSL Certificate Key Size Uses HSTS Edit Entry Show Notes
2leep.com no not applicable not applicable not applicable not applicable not applicable not applicable Edit

Number of edits: 1

Show
4tulemar.com yes no yes yes no yes 2048 no Edit

Number of edits: 2

Show
Arch Linux yes yes no yes yes 2048 no Edit

Number of edits: 1

Show
SifterApp.com yes no yes yes yes yes 2048 yes Edit

Number of edits: 2

Show
Thumbtack.com yes no yes yes yes yes 2048 yes Edit

Number of edits: 2

Show
Thumbtack.com 2048 Edit

Number of edits: 1

Show
Tutkiun.com no no no yes yes not applicable Edit

Number of edits: 3

Tutkiun! is The Technology Guide - a place for programming languages comparison, how-to articles, social networking tricks and tips etc.

Show
Vendder not applicable not applicable not applicable not applicable not applicable not applicable not applicable Edit

Number of edits: 1

Show
Www.youtube.com no no yes yes yes yes yes Edit

Number of edits: 4

Vite

Show
a.fsdn.com yes no yes yes not applicable yes 1024 no Edit

Number of edits: 1

Show
abnamro.nl yes no no yes no yes 2048 no Edit

Number of edits: 1

Parts of the site switch to http, some are optionally https.

Show
about.com no not applicable not applicable not applicable not applicable not applicable - not applicable Edit

Number of edits: 2

Show
accesslabs.net yes no yes yes no yes 2048 no Edit

Number of edits: 1

Show
accesslabs.org yes no yes yes no yes 2048 no Edit

Number of edits: 1

Show
aclu.org no not applicable no no not applicable not applicable no Edit

Number of edits: 1

Show
adobe.com yes yes yes yes no yes 2048 yes Edit

Number of edits: 3

Show
alibaba.com no not applicable not applicable not applicable not applicable not applicable - not applicable Edit

Number of edits: 2

Show
aljazeera.com no not applicable not applicable not applicable not applicable not applicable NA no Edit

Number of edits: 1

Show
amazon.com yes not applicable no no yes 1024 no Edit

Number of edits: 3

forcing https is actively prevented.

Show
amazon.fr no yes yes yes yes yes 2048 yes Edit

Number of edits: 7

Show
Name Uses HTTPS on Some Pages Free of Mixed Content Uses HTTPS on
All Pages
All Identifying Information Encrypted Only Uses Secure Cookies Has a Valid SSL Certificate Key Size Uses HSTS Edit Entry Show Notes