Why you should care about HTTPS ?
You should always prefer visiting HTTPS version of websites when available, even if you think that they don’t handle sensitive communications. Aside from providing critical security and data integrity for your personal information, HTTPS is a requirement for many new browser features. Here are three important aspects why you should use HTTPS:
- Every unencrypted HTTP request reveals information about your behavior. Your ISP, your employer, hotel in which you are staying or even your neighbour(if you are using local network) can see exactly which page/video are you watching. This is particularly important when browsing adult pages.
- Many intruders look at aggregate behaviors to identify users.
- HTTPS doesn’t just improve security of websites you are browsing. It’s also a requirement for many cutting-edge features like fast and efficient HTTP/2 protocol.
HTTPS protects your privacy and security
HTTPS prevents intruders from being able to passively listen to communications between you and websites you are visiting.
Every unencrypted HTTP request reveals information about your behavior. Your ISP, your employer, hotel in which you are staying or even your neighbour(if you are using local network) can see exactly which page/video are you watching. This is particularly important when browsing adult pages.
Although a single visit to one unprotected websites may seem benign, some intruders look at the aggregate browsing activities of users to make inferences about their behaviors and intentions, and to de-anonymize their identities. For example, employees might inadvertently disclose sensitive health conditions to their employers just by reading unprotected medical articles. Do you want third parties to do the same when you are browsing porn ?
HTTPS protects the integrity of website you are visiting
HTTPS helps prevent intruders from tampering with the communications between websites and users’ browsers. Intruders include intentionally malicious attackers, and legitimate but intrusive companies, such as ISPs or hotels that inject ads into pages.
Intruders exploit unprotected communications to trick users into giving up sensitive information or installing malware, or to insert their own advertisements into website resources. For example, some third parties inject advertisements into websites that potentially break user experiences and create security vulnerabilities.
Intruders exploit every unprotected resource that travels between websites and users. Images, cookies, scripts, HTML … they’re all exploitable. Intrusions can occur at any point in the network, including a user’s machine, a Wi-Fi hotspot, or a compromised ISP, just to name a few.