Bitcoin Forum
May 08, 2024, 06:54:53 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Security researchers to AV vendors: "Stop intercepting HTTPS traffic"  (Read 193 times)
TheIrishman (OP)
Legendary
*
Offline Offline

Activity: 1049
Merit: 1006


View Profile
February 09, 2017, 05:54:37 PM
 #1



Security researchers to AV vendors: "Stop intercepting HTTPS traffic"

http://www.myce.com/news/security-researchers-av-vendors-stop-intercepting-https-traffic-81436

Google, Mozilla, Cloudflare, and researchers from two Universities have criticised the interception of HTTPS traffic by antivirus software. According to the researchers and companies this has far-reaching consequences for the safety of users and their internet connection.

By default it's not possible for antivirus software to access HTTPS traffic. By installing an own root certificate on the user's computer, the antivirus applications have found a way to be able to analyze the content of encrypted internet connections. This method is frequently used by antivirus vendors. However, the way the software intercepts HTTPS traffic decreases the security of it. Even worse, the virus scanners introduce all kinds of new vulnerabilities, according to a report released by the researchers and companies.

For the report, the researchers analyzed 8 billion secured connections to the Firefox update servers, to several popular e-commerce websites and to Cloudflare's content distribution network. About 4% of the connections to the Firefox servers was intercepted, 6.2% of the e-commerce websites and 10.9% of the connections to Cloudflare was intercepted. The researchers also analyzed the security impact of the intercepted connections. About 97% of Firefox, 32% of e-commerce, and 54% of Cloudflare connections that were intercepted became less secure.

"Alarmingly, not only did intercepted connections use weaker cryptographic algorithms, but 10–40% advertised support for known-broken ciphers that would allow an active man-in-the-middle attacker to later intercept, downgrade, and decrypt the connection", according to the researchers.

While it was already known that security software intercepted HTTPS traffic, the researchers were still surprised, "while the security community has long known that security products intercept connections, we have largely ignored the issue, believing that only a small fraction of connections are affected. However, we find that interception has become startlingly widespread and with worrying consequences."

Thy hope that security vendors will start using alternatives to HTTPS interception as, "interception products drastically reduce connection security."

Source: Myce.com
The network tries to produce one block per 10 minutes. It does this by automatically adjusting how difficult it is to produce blocks.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715194493
Hero Member
*
Offline Offline

Posts: 1715194493

View Profile Personal Message (Offline)

Ignore
1715194493
Reply with quote  #2

1715194493
Report to moderator
JengoFF_n0
Jr. Member
*
Offline Offline

Activity: 56
Merit: 10


View Profile
February 09, 2017, 08:01:50 PM
 #2

I can not understand why you are so surprised. If one person came up with it means that there is always the possibility that another person will find a way to bypass this protection. Communication has never been anonymous.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!