Explicit effect for those EV Enhanced Validation ( fingerprint keys ) with https lock icon

%3CLINGO-SUB%20id%3D%22lingo-sub-2398961%22%20slang%3D%22en-US%22%3EExplicit%20effect%20for%20those%20EV%20Enhanced%20Validation%20(%20fingerprint%20keys%20)%20with%20https%20lock%20icon%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2398961%22%20slang%3D%22en-US%22%3E%3CP%3ECan%20we%20have%20EXPLICIT%20visual%20notification%20of%20an%20Extended%20Validated%20domain%20be%20made%20visible%20in%20the%20Edge%20series%20of%20browsers%3F%20Secure%20browsers%20can%20be%20intercepted%2C%20decrypted%20but%20the%20authentic%20site's%20fingerprint%20CANNOT%20be%20duplicated!%3C%2FP%3E%3CP%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Ffeed%2Fhashtag%2F%3Fkeywords%3Dwindowsinsider%26amp%3BhighlightedUpdateUrns%3Durn%253Ali%253Aactivity%253A6804701948873383936%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%20target%3D%22_blank%22%3E%23windowsinsider%3C%2FA%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Ffeed%2Fhashtag%2F%3Fkeywords%3Dwindowsdev%26amp%3BhighlightedUpdateUrns%3Durn%253Ali%253Aactivity%253A6804701948873383936%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%20target%3D%22_blank%22%3E%23windowsdev%3C%2FA%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Ffeed%2Fhashtag%2F%3Fkeywords%3Dwindowsblog%26amp%3BhighlightedUpdateUrns%3Durn%253Ali%253Aactivity%253A6804701948873383936%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%20target%3D%22_blank%22%3E%23windowsblog%3C%2FA%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Ffeed%2Fhashtag%2F%3Fkeywords%3Dmicrosoftedge%26amp%3BhighlightedUpdateUrns%3Durn%253Ali%253Aactivity%253A6804701948873383936%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%20target%3D%22_blank%22%3E%23MicrosoftEdge%3C%2FA%3E%3C%2FP%3E%3CP%3ESecure%20browser%20connections%26nbsp%3Bcan%20be%20intercepted%20and%20decrypted%3CBR%20%2F%3Eby%20authorities%20who%20spoof%20the%20authentic%20site's%20certificate.%20But%3CBR%20%2F%3Ethe%20authentic%20site's%20fingerprint%20CANNOT%20be%20duplicated!%3C%2FP%3EDomain%26nbsp%3BName%20Certificate%26nbsp%3BName%20EV%20Security%20Certificate's%26nbsp%3BAuthentic%26nbsp%3BFingerprint%20%26nbsp%3B%3CP%3E%26nbsp%3B%3C%2FP%3Ecia.gov%20%3CA%20href%3D%22http%3A%2F%2Fwww.cia.gov%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ewww.cia.gov%3C%2FA%3E%20%26nbsp%3B%3CP%3E%26nbsp%3B%3C%2FP%3EBC%3A31%3A82%3AE9%3A82%3A57%3A29%3A0B%3AAA%3A42%3A7C%3AA3%3A05%3AA7%3A75%3A40%3A82%3A4E%3A4F%3AA5%20Each%20site's%20authentic%20security%20certificate%20fingerprint%20(shown%20above)%20was%20just%20now%20obtained%20by%20GRC's%20servers%20from%20each%20target%20web%3CBR%20%2F%3Eserver.%26nbsp%3BIf%20your%20web%20browser%20sees%20a%20different%20fingerprint%20for%20the%20same%20certificate%26nbsp%3B(carefully%20verify%20the%20Certificate%20Name%20is%20identical)%20that%3CBR%20%2F%3Eforms%20strong%20evidence%20that%26nbsp%3Bsomething%20is%20intercepting%20your%20web%20browser's%20secure%20connections%26nbsp%3Band%20is%20creating%20fraudulent%20site%20certificates.%20%26nbsp%3B%20Custom%20Site%20Fingerprinting%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.grc.com%2Ffingerprints.htm%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Fwww.grc.com%2Ffingerprints.htm%3C%2FA%3E%3C%2FLINGO-BODY%3E
Occasional Contributor

Can we have EXPLICIT visual notification of an Extended Validated domain be made visible in the Edge series of browsers? Secure browsers can be intercepted, decrypted but the authentic site's fingerprint CANNOT be duplicated!


#windowsinsider #windowsdev #windowsblog #MicrosoftEdge

Secure browser connections can be intercepted and decrypted
by authorities who spoof the authentic site's certificate. But
the authentic site's fingerprint CANNOT be duplicated!

Domain NameCertificate NameEVSecurity Certificate's Authentic Fingerprint
 

 

cia.govwww.cia.gov
 

 

BC:31:82:E9:82:57:29:0B:AA:42:7C:A3:05:A7:75:40:82:4E:4F:A5
Each site's authentic security certificate fingerprint (shown above) was just now obtained by GRC's servers from each target web
server. If your web browser sees a different fingerprint for the same certificate (carefully verify the Certificate Name is identical) that
forms strong evidence that something is intercepting your web browser's secure connections and is creating fraudulent site certificates.
 
Custom Site Fingerprinting
https://www.grc.com/fingerprints.htm
0 Replies