Explore the complexities of HTTPS connections and data security in this 21-minute conference talk from USENIX Enigma 2016. Delve beyond the simple "lock" icon in web browsers to understand the intricate topology of services handling data after it leaves the HTTPS tunnel. Learn about the evolution of HTTPS termination, the impact of low-cost web infrastructure services on secure global caching, and the challenges of extending trust beyond the initial connection. Discover potential approaches to bridge security gaps and gain insights into the true journey of web data once it reaches the server side. Examine topics such as Moore's Law, cloud computing, modern web properties, edge networks, and negative security indicators to enhance your understanding of online data protection.
Trust Beyond the First Hop–What Really Happens to Data Sent to HTTPS Websites - USENIX Enigma Conference - 2016
USENIX Enigma Conference via YouTube
Overview
Syllabus
Intro
What is a padlock
What is HTTPS
Moores Law
The Cloud
Modern Web Properties
Github
Edge Network
Google Front End
Data Protection
HTTP
Negative Security Indicators
Taught by
USENIX Enigma Conference