What is HTTPS?
When you browse the Internet—you know, when you go to google.com to search for puppies—you are using HTTP (the HyperText Transport Protocol), or more likely, HTTPS (HTTP Secure). HTTPS prevents other people from eavesdropping on your puppy search. Or replacing those puppies with less cute ones, without you knowing.
When you browse the Internet today, most of the stuff you see is already HTTPS—and you probably notice the “Not Secure” indicator when it’s not. Your banks and sensitive websites—and certainly your searches and social media—are all secure by default using HTTPS. Even your email is probably protected by a similar tool.
HTTPS is what protects you against the scariest threats at a coffee shop, and it’s why I feel safe browsing the web wherever I go.
What does “secure” mean, and how does HTTPS work? Let’s dive in.
What is the Internet, and why does it need security?
No matter how you slice it, the Internet is simply a way for computers to communicate electronically:
- When you load a website (like Google), your computer is asking another computer for that website.
- When you watch Netflix, you’re asking a computer somewhere to send you all 6 seasons of Community in one weekend.
- When you send an email, your computer sends that email to Hotmail’s (or whomever’s) servers for your friend to read later.
Each of these communication methods follows a standard set of rules—a protocol. These protocols specify exactly how to package up your data to send it properly, just like you have to do with snail mail.
Snail mail is pretty safe, and easy to protect. We send cash and checks in the mail all the time.
At first, the Internet was pretty safe, too—because it was also tiny. The core protocols that defined the Internet—like HTTP, TCP/IP, DNS, and SMTP—made no effort to protect your data from snoops.
Specifically, these protocols only described how to send your data as plaintext—unencrypted, just like physical mail. All hackers needed to do to steal your passwords as you sent them to Google was eavesdrop, which is very easy to do: hence the warnings to avoid coffee shop wi-fi.
This simple design, which helped the Internet spread quickly, but soon became a liability. Billions of people live their lives on the Internet, each one of them a goldmine of secrets for criminals (and even governments).
In response, security specialists drafted “secure” variants of most Internet standards.
Introducing HTTPS
Importantly for us, these specialists included a secure version of HTTP, HTTPS (“HTTP Secure”).
HTTPS protects traffic on the Internet by sending it as cyphertext: encrypted. If everything works right, only you and your destination can read the contents.
With HTTPS, we now had the ability to keep your content secure as it traveled the Internet.
For a long time, though, HTTPS languished, and most Internet communication remained insecure. But recently, thanks to initiatives by Google, Let’s Encrypt, the EFF, and many others, encrypted Internet traffic in the United States nearly doubled between 2015 and 2018. That number keeps going up, and it’s the reason you can browse open wireless networks in relative peace.
In fact, when I first wrote this article, only about 60% of Internet traffic was encrypted. Today, over 90% is.
The old Internet – before HTTPS
HTTPS makes your web browsing much safer because it protects against the easiest and most dangerous direct attack possible on the Internet: the man-in-the-middle attack.
A man-in-the-middle attack in general is any attack where someone intercepts your communication before it reaches its destination. The most straightforward practical example is someone at the post office reading all your mail.
In the case of the Internet, an attacker reads the data your computer sends to and receives from a wi-fi router, or a more powerful attacker (like a government) reads data going across a larger router located deeper in the Internet.
The man-in-the-middle attack is so dangerous on the Internet because:
- it can be completely silent,
- it compromises everything you send and receive while browsing, and
- it is cakework to implement.
How easy it once was
A well-publicized example of just how easy this attack was comes from a free plugin for Firefox called Firesheep.
In 2010, Eric Butler released Firesheep as a demonstration. This plugin made impersonating Facebook accounts as easy as “double-click[ing] on someone” (Butler, 2010). He did this to motivate websites to switch to HTTPS. As Butler implored in 2010:
The only effective fix for this problem is full end-to-end encryption, known on the web as HTTPS or SSL.
Firesheep can’t hack Facebook anymore because Facebook switched to HTTPS by default in 2013.
It took them 3 years.
The secure Internet – with HTTPS
HTTPS makes the man-in-the-middle attack almost impossible, except for in a few edge cases. It is the reason I can feel safe reading Facebook (and even accessing my bank) on public Wi-Fi—in a specific set of circumstances.
Using HTTPS is a bit like sending coded messages through the mail: how secure you are depends on how secure your encryption is, how trustworthy the recipient is, and how sensitive the information on the envelope is, among other things.
But HTTPS does not secure every part of your Internet browsing, and you must double check it to make sure no one is attacking you.
The best way to keep yourself secure is to learn how HTTPS works.
How HTTPS works
HTTPS relies on “public key encryption.” Public key encryption is a form of encryption that relies on a pair of numbers—or “keys”:
- a publicly available key (a “public key”) and
- a corresponding private key.
These keys can be used to generate messages that only the other key can unscramble (using math!). If you encrypt a message with a public key, only someone with the private key can decrypt it, and if you encrypt a message with a private key, anyone with the corresponding public key can be sure you wrote it.
Servers distribute specially-formatted public keys—called “certificates”—and your browser encrypts its initial message to the server using that public key. Because only the server has the right private key, you can be sure no one else reads your message. Your browser and the server then negotiate new keys, private to each of you, for the rest of the connection.
Encrypting your communication with these keys stops man-in-the-middle attacks cold. As long as the encryption you use is strong enough, eavesdroppers just see gibberish passing between you and webkinz.com.
However, what if an attacker pretends to be the server, giving you a false certificate? They can pretend to be webkinz.com, intercept your messages, and then send them to the real webkinz.com. Your traffic may be encrypted, but it’s still man-in-the-middled!
That’s why on the Internet, although the certificates may be public, they also carry a proof of identity: a “signature” from a Certificate Authority.
There are dozens of Certificate Authorities, and each does the same thing: if you can prove you own a site, the authority will “sign” your certificate to say “this certificate is from the owner of miniclip.com.” Like an HTTPS certificate itself, this signature is also a form of public key cryptography. The authority generates a signature using another private key, and they distribute its corresponding public key to browsers. Most browsers maintain their own careful list of trusted Authorities, adding new ones or removing corrupt ones from time to time.
You need two things to be secure
With server certificates and Certificate Authorities, you know that all your traffic to msn.com is going to msn.com and no one else. Trusting that you’re on the right site becomes as simple as verifying two things:
- The HTTPS encryption is done correctly, using a strong algorithm with no weaknesses, and
- The Certificate Authorities you trust are not corrupt.
How your browser helps you with HTTPS
Your browser helps you verify those two things.
You may have noticed the green lock and green “secure” or seen the https://
in your URL on some sites. This is your browser helping you; it is the only authoritative indicator that HTTPS is working and your connection is secure. Nothing else—not a badge or a written assurance of “military-grade security” on the webpage, not the word “secure” in the URL—can prove your connection is secure.
As mentioned above, browsers also maintain lists of trusted Authorities. If you use an auto-updating browser, you can be pretty confident that the list is good.
To understand how your browser gives you information about security, see my video “Understanding HTTPS in your browser.”
There’s more to security than HTTPS
This padlock secures your data as it crosses the Internet. It does not guarantee anything else:
- Not that your computer is up-to-date and virus free;
- Not that the website will store your password safely in its database;
- Not that the site you’re talking to is actually the one you want to talk to.
For example, HTTPS guarantees that when you talk to Snapple.com you are actually talking to Snapple.com. It doesn’t say you should give your Apple logins to them.
HTTPS does not indicate any security except that your communication was secure in transit, but that’s a very important thing; the rest you can verify separately.
The rest of the steps
After you’ve secured the part of your communication that crosses the Internet, you must secure your devices and your destination.
I believe that security literature focuses on man-in-the-middle attacks because they’re so easy without encryption: they leave little trace, can be performed without direct contact (especially if you’re a government), and are extremely powerful.
Once man-in-the-middle attacks are mitigated, you need to minimize your other security holes before you can browse safely.
That we cover in How to stay safe.