47

You're a flippin bank, and your public website has an invalid cert!? WTF. No, I'm done, and I don't trust you with my money either.

Comments
  • 1
    Select Advanced, view the cert, import the CA in your root store. Problem solved, permanently.
  • 4
    @sebastian .. but do you really trust somebody else's self-created CA?
  • 0
    @juneeighteen If im on a trusted connection I know its not being snooped on (for example my home fiber), and the cert is created by my bank.

    but if you dont trust the cert, just type 'badidea' on your keyboard, without the quotes, in the "air" while on the cert error screen.
  • 3
    Does the bank rhyme with shitty or hells embargo?
  • 2
    @sebastian That is a bad practice. Imagine a guy in the cafe runing a MITM scheme, they make a proxy site similar to that and show you their certificate. Because you keep accepting self-signed certificates like that you accept it with no second look (people are so good at making these habits) and poof, attacker got your session data, or worse - your identity and card data. Trust me, CA's are there for a reason. :)
  • 0
    @arekxv Thats why you don't do it on a untrusted connection like the cafe, but a trusted connection like home fiber.
  • 1
    Doesn't have to be invalid. It is probably self signed.

    PS.
    Why isn't everyone using letsencrypt at this point
  • 0
    @Dacexi let's encrypt is awesome! So is AWS very generation on CloudFront :) with crest being easy and cheap now, I don't understand how it can be done so wrong elsewhere
  • 0
    @Dacexi I use them for all my sites!
  • 1
    If it's a bank it's likely someone screwing with you hoping you will type in the your details so they can take them ...

    It's a bank after all its unlikely they certificate is not signed by an authority ... Unless your using an old OS ... That doesn't have the certificate
Add Comment