HTTPS by default
Testing HTTP and current browser behavior
- Commenters mention tools like http.rip, neverssl.com, and example.com as ways to trigger HTTP flows or captive portals; some now use HTTPS first and then JS to load random HTTP subdomains to defeat automatic HTTPS upgrading.
- Chrome already flags HTTP as “Not Secure,” with stronger warnings in Incognito and Advanced Protection. The announced change adds a blocking interstitial for HTTP navigations, with exceptions for private/internal sites. Localhost is treated as “secure” even without HTTPS.
HTTPS adoption and Linux/intranet usage
- Discussion notes Linux’s lower HTTPS percentage is largely due to local dashboards and intranet UIs (phpMyAdmin, netdata, homelab services) typically running over HTTP.
- When internal/private sites are excluded, Linux HTTPS usage jumps to ~97%, aligning with other platforms.
Home and intranet TLS challenges
- Main friction points: getting certs for internal hostnames/IPs, running a private CA across heterogeneous devices (Android split trust stores, Firefox separate store), and certificate transparency exposing internal hostnames.
- Workarounds include cheap public domains plus wildcard certs, DNS-based ACME challenges, or many small ACME clients; some see this as still too complex/paid for a “home intranet.”
- Some argue HTTP on a “trusted LAN” is acceptable; others point to hostile IoT devices, ISP/neighbor access, and future WiFi breaks as reasons to encrypt internally too.
Arguments for HTTPS-by-default
- Proponents emphasize: prevention of on-path tampering (ISP/hotel ad injection, captive-portal hacks), credential theft (Firesheep-era session hijacking), and pervasive surveillance (sensitive topics, political/medical browsing).
- They stress that site owners can’t know a user’s threat model; even static blogs benefit from integrity and privacy.
- Commenters say automation (ACME, Caddy, cloud/CDN integration) has made certificate management largely “set and forget.”
Critiques: complexity, centralization, and user control
- Skeptics see increased dependence on CAs and browser vendors (especially Google/Chrome), more operational complexity (short cert lifetimes, rotation, tooling), and risk of future policy abuse (sanctions, attestation, CA consolidation).
- Some object to forcing HTTPS even for trivial content, arguing this trains users to click through warnings and turns the open web into a more controlled, corporate ecosystem.
- There’s concern that HTTPS hides traffic from device owners as well (harder to inspect what apps/big platforms are exfiltrating), while not stopping corporate or government MITM on managed devices.
Corporate MITM and captive portals
- Several note enterprise setups that install a custom root CA and proxy all HTTPS, effectively MITM’ing employees; some see this as normalized, others as unacceptable or even illegal in some jurisdictions.
- Captive portal vendors often still rely on HTTP-only redirects and even instruct admins to disable HTTPS before auth; commenters predict they’ll lag until breakage forces updates, despite better DNS/OS-level captive mechanisms existing.