Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Communications Google Privacy Your Rights Online

Gmail Moves To HTTPS By Default 275

clone53421 writes "Although Gmail has long supported HTTPS as an option, Gmail announced their decision yesterday to switch everyone to HTTPS by default: 'We initially left the choice of using it up to you because there's a downside: https can make your mail slower since encrypted data doesn't travel across the web as quickly as unencrypted data. Over the last few months, we've been researching the security/latency tradeoff and decided that turning https on for everyone was the right thing to do.' I wonder if this has anything to do with the reports of Chinese users having their accounts hacked? 'Only two Gmail accounts appear to have been accessed, and that activity was limited to account information (such as the date the account was created) and subject line, rather than the content of emails themselves,' said David Drummond in that blog update. That does sound like it perhaps could be a result of insecure HTTP traffic being intercepted in transit between the users and Gmail's servers."
This discussion has been archived. No new comments can be posted.

Gmail Moves To HTTPS By Default

Comments Filter:
  • Hang on... (Score:2, Funny)

    by Anonymous Coward

    That does sound like it perhaps could be a result of insecure HTTP traffic being intercepted in transit between the users and Gmail's servers."

    If someone can intercept your traffic how will this help? They can intercept all your secret handshake bits too.

    • Re:Hang on... (Score:5, Informative)

      by Brian Gordon ( 987471 ) on Wednesday January 13, 2010 @05:59PM (#30757698)

      Might as well scoop up the mod points if someone's going to get them. This, moron [wikipedia.org].

  • by Anonymous Coward on Wednesday January 13, 2010 @05:36PM (#30757412)

    We need network neutrality for encrypted packets!

  • iGoogle support? (Score:5, Informative)

    by l2718 ( 514756 ) on Wednesday January 13, 2010 @05:38PM (#30757432)
    For the moment Google's own gadget for for iGoogle doesn't support HTTPS access to gmail.
    • Re:iGoogle support? (Score:5, Informative)

      by incripshin ( 580256 ) <markpeloquin@gmail . c om> on Wednesday January 13, 2010 @05:46PM (#30757522) Homepage
      I have been complaining about this for a while. You cannot mix http and https content in a page, so the only solution is to send the whole page and all the gadgets over https. This is possible to do now, though you have to type in https://www.google.com/ig [google.com] (necessary parts: https, www, /ig). There is also no preference for this as far as I can tell.
      • Re: (Score:2, Insightful)

        by incripshin ( 580256 )
        Offtopic? You cannot be serious.
      • Re: (Score:3, Informative)

        by linj ( 891019 )
        This has been extant for a very long time.

        The problem with this which Google hasn't fixed yet, despite lots of screaming users, is that when you try to search from that search box, it ... doesn't work. It redirects you back to the original Google homepage, which isn't very smooth.

        Other than that, however, it's fine!
      • by kindbud ( 90044 )

        u cannot mix http and https content in a page,

        <Kyle's Mom>Wha-wha-wha?</Kyle's Mom>

        Sure 'u' can.

        • I guess I should be more specific. Two documents that were sent over differing protocols cannot interact. A frame or iframe has its own document.

          Or are you referring to my use of 'you' as a genderless third person?

    • I believe it does. I'm not sniffing, so I could be wrong here. Do you have any explanation for this statement?

      • Every two weeks or so Google asks you to reconfirm your password. If the app hits this, it will give you the https error. All you have to do is manually log in and the app will work again.

  • by FooAtWFU ( 699187 ) on Wednesday January 13, 2010 @05:38PM (#30757440) Homepage
    Google couldn't really tell if there was sniffing going on in their users' connections. They could, however, figure out exactly what sort of activities someone using POP or IMAP or the web UI (or some compromised internal Google tool) ended up doing, based on logs.
    • Given that connecting a new POP3 client, or new IMAP client, and syncing up your data is likely to grab everything in your relevent folders, including "All Mail" if you're not careful, I doubt that such transactions would normally be noticed. And given the incredible amount of logging involved, I doubt that Google hangs onto those logs for very long. Can anyone attest to how long individual transaction is preserved for at Google?

  • Great! (Score:4, Informative)

    by jwinster ( 1620555 ) on Wednesday January 13, 2010 @05:40PM (#30757456)
    Great move by Google, although TFA points out that there are some problems with offline gmail and HTTPS, kudos to them for coming straight out and saying it may be a problem, while posting a link for some workarounds: http://mail.google.com/support/bin/answer.py?hl=en&answer=172697 [google.com]
    • Re: (Score:2, Interesting)

      by Anonymous Coward

      Great move by Google,

      Especially considering yahoo & hotmail don't have any option for https.

  • encrypted data doesn't travel across the web as quickly as unencrypted data.

    Why on earth would that be? Routers don't know whether your data is encrypted or not. The one difference I can think of is that encrypted data can't be compressed. But that wouldn't have any effect on latency, just throughput. And that can be taken care of by compressing the data before you encrypt it anyway.

    • Re: (Score:3, Informative)

      by Anonymous Coward

      1. Encrypted data generally has a percentage overhead

      2. Encrypted data, if the algorithm doesn't suck, is not easily compressed.

      • Re:Wait, what? (Score:4, Informative)

        by HeronBlademaster ( 1079477 ) <heron@xnapid.com> on Wednesday January 13, 2010 @05:54PM (#30757624) Homepage

        3. Encrypted data has two processing phases, one at each end of the connection that do not apply to unencrypted data: encryption and decryption. By "not as quickly" they were probably referring to end-users' perspective more than network transmission time.

        • Re: (Score:2, Funny)

          by Anonymous Coward

          4. Profit!

      • 1a - If your email is encrypted with IPSEC, then there's a per-packet overhead from the extra packet header; it's not really a percentage, though you could think of it that way for average packet sizes. It's not significant for most applications except VOIP, which typically has very small data wrapped in lots of RTP/UDP/IPSEC/IP headers.

        1b - If your email is encrypted at or above the transport layer, there's typically minimal overhead. The data encryption doesn't take extra space, except sometimes for t

      • Re:Wait, what? (Score:4, Insightful)

        by Sir_Lewk ( 967686 ) <sirlewk AT gmail DOT com> on Wednesday January 13, 2010 @06:54PM (#30758476)

        2. Encrypted data, if the algorithm doesn't suck, is not easily compressed.

        That is why you always apply compression before encryption. Not exactly rocket science.

    • Re: (Score:2, Insightful)

      I suspect they were just dumbing down all the overheads of using encryption into one catchall sentence.

    • Re:Wait, what? (Score:4, Informative)

      by Ant P. ( 974313 ) on Wednesday January 13, 2010 @05:54PM (#30757618)

      Routers don't know whether your data is encrypted or not.

      Neither does your browser, or the server. HTTP is a stateless protocol. Every encrypted request requires setting up the encryption all over again.

      • by TSHTF ( 953742 )
        Not always the case anymore. Web browsers and servers have implemented persistent connections (keep-alive) for a while. It's in the RFC [ietf.org].
        • Re: (Score:3, Informative)

          by duguk ( 589689 )

          Not always the case anymore. Web browsers and servers have implemented persistent connections (keep-alive) for a while. It's in the RFC [ietf.org].

          You're both right, but the GP is righter. Yes, persistant connections have been around since 1999. But it still DOES starts the encrypted request all over again.

          It is persistent, but it is also stateless. Makes sense when you think about it.

          • Hmm, I wonder if I should try to finish my old project:
            An AES encrypted packet-based bytestream connection between the client and the server, implemented in pure JavaScript (client) and Java (server).
            With JSON inside the packets. And most importantly: One standing connection. (A single HTTP request that does not time out.)
            I already did the basic framework. Back then I had already a “network card” and a “network file system” protocol and object. Also compression is built-in into HTTP

            • HTML 5 includes a WebSocket object that allows you to keep persistent connections to the server and send data in both directions over it.
          • Re:Wait, what? (Score:5, Informative)

            by profplump ( 309017 ) <zach-slashjunk@kotlarek.com> on Wednesday January 13, 2010 @07:16PM (#30758796)

            If you're using keep-alive at the HTTP layer you're most certainly not closing and re-opening the underlying SSL socket -- in typical implementations the HTTP code is only vaguely aware that SSL even exists.

            Now not every server or client supports or uses keep-alive. But if you do then SSL is only negotiated once per session, not once per HTTP request.

    • Re: (Score:3, Insightful)

      by Anonymous Coward

      The reason why encrypted data tends not to travel as quickly (other than the fact that it is incompressible) is that a lot of DPI filters in a number of links throttle anything encrypted, assuming if it is encrypted, then its P2P traffic.

      • A couple years ago, I migrated a company to a new mail host and set up all of their clients to use encrypted connections. A few months later, I got reports that people all over the main office were reporting problems sending and receiving mail. Turn off the encryption, everything flows fine. Turn it on, throttled to uselessness. Remote offices weren't seeing this problem and the mail host said their systems were running fine. All I could figure was some BOFH between the main office and the mail hosting

    • by Hairy1 ( 180056 )

      Apart from the CPU of encrypting there is the issue of compression. Perhaps some physical network links use compression, and encrypted traffic can't be compressed?

    • Re: (Score:3, Informative)

      by profplump ( 309017 )

      The article is imprecise, but HTTPS is higher latency, even when network and CPU capacity are sufficient -- setting up an SSL connection requires several more round trips than raw HTTP, so if your latency is higher than 0 it can be noticeably slower to use encrypted connections.

      Encrypted connections also typically have some per-datagram overhead, though that's typically pretty small, and not strictly necessarily on streams if you're willing to give up integrity checks. And there is a CPU load. The CPU facto

  • Intercepting emails (Score:5, Informative)

    by Adrian Lopez ( 2615 ) on Wednesday January 13, 2010 @05:47PM (#30757542) Homepage

    'Only two Gmail accounts appear to have been accessed, and that activity was limited to account information (such as the date the account was created) and subject line, rather than the content of emails themselves,' said David Drummond in that blog update. That does sound like it perhaps could be a result of insecure HTTP traffic being intercepted in transit between the users and Gmail's servers.

    Actually, I read somewhere that hackers gained access to a system designed to give law enforcement access to people's emails, presumably under warrant. [sarcasm]Who could have ever imagined the same loopholes intended for use by law enforcement could possibly be exploited by hackers as well?[/sarcasm]

    • Found the source (Score:5, Informative)

      by Adrian Lopez ( 2615 ) on Wednesday January 13, 2010 @05:59PM (#30757694) Homepage

      I found the source. It's from PC World [pcworld.com]:

      That's because they apparently were able to access a system used to help Google comply with search warrants by providing data on Google users, said a source familiar with the situation, who spoke on condition of anonymity because he was not authorized to speak with the press. "Right before Christmas, it was, 'Holy s***, this malware is accessing the internal intercept [systems],'" he said.

      • by Anonymous Coward on Wednesday January 13, 2010 @07:47PM (#30759172)

        And that right there, proves we're at war with China--much more than Al Qaeda. Just like George Washington's crossing of the Delaware, their attacks happen on Christmas eve.

        People say it's kolluj students with time off, and to a certain extent--near uni holidays, you can see port scans and other crap go up. But the real--nasty brutish attempts, the subtle ones--happen christmas, easter, labor day--right when people aren't paying close attention. They're diabolical, they're automated--and tools like fail2ban don't catch the ssh brute force attempts, because they come from thousands of hosts one at a time--just trying to sneak in. And that's in addition to the web application attacks.

        I haven't finished writing my fake SSH server yet to see what people do when they get in, but I'm betting the entire medium is just one giant funnel to beijing intelligence looking to slurp down as many usernames and passwords as they can.

        They're in our network, they've been in our networks. They've compromised the DoD, and hundreds of defense contractors, and the national labs. And because they're all corporate, it hardly ever makes the news--people that reveal it are sued and/or fired under suspicious circumstances.

        Make no mistake--this is war, and China is winning because we refuse to even admit it.

        • Re: (Score:3, Interesting)

          by rastoboy29 ( 807168 )
          What, you think we're not doing it to them?  Don't be naive.  They just aren't honest enough to admit it.

          But please do tone down the rhetoric.  Nobody is being killed.  Even knock on effects can't be called a "war".

          We're all just chillin' here hk0ring each other's shti.
    • by AHuxley ( 892839 )
      Its all in plain text until sent, thats how LOE gets to read, google is a good company.
      The end users feels safe as they are using the "s" and no more plain text in the wild.
      Google would have never offered "s" unless they have a backdoor.
    • While true that it wasn't interception - I am sure the recent involvement with the Chinese security issues has simply brought into focus how much Google is being attacked, also knowing that they are dealing with some relatively skilled hackers. Whether the attacks were designed to sniff out people not using HTTPS or not - better to just remove that option altogether.

  • by maillemaker ( 924053 ) on Wednesday January 13, 2010 @05:49PM (#30757552)

    I've long held that the only answer to pervasive surveillance is to encrypt everything.

    It won't stop them from cracking things that attract their attention, but for most things it won't be worth the hassle.

    Encrypt everything.

    • Encrypt everything.

      I agree, and let me add I always thought Freenet's model was onto something. It's very failure proof and it caches static content. Which unfortunately is everything. But there's probably a way to get something wiki-like using the current message board implementation, providing one had an application that could interpret the data from a dedicated board.

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      I've often wondered why email clients don't make it easier to set up encryption, and use it as the default if your recipient and you have exchanged keys (preferrably automatically if both have the capacity.) Sure, if you're semi-clued up it's not that hard to set this up manually, but to the average user it's way out of their comfort zone.

    • I don't know, I think there are some things that don't need encryption. I don't think I will ever need encryption to read google news, for example, or to watch youtube movies.
      • Maybe you don't want that cute barista (who is also a geek and watches coffee-shop router traffic for fun) to know you are watching a Taylor Swift video?
      • by dissy ( 172727 ) on Wednesday January 13, 2010 @07:19PM (#30758822)

        I don't know, I think there are some things that don't need encryption. I don't think I will ever need encryption to read google news, for example, or to watch youtube movies.

        Actually yes you need to encrypt that too.

        If you are selective about what you encrypt, then the best assumption to make is that the things you don't want/need to hide are plain text, and the things you want/need to hide are encrypted.

        Now when I am watching your data stream and see some google news, a youtube video, and finally an encrypted block of data, it is almost certain that whatever is in that encrypted block of data is worth my while to try and crack, as it is clearly data you want hidden.

        If you encrypt everything all the time, then I would always wonder what you are hiding (if anything!)
        I could take some of your encrypted data and try to crack it. Say it works once or twice, and all I see are you reading your daily news, and some video of a kitten falling over on youtube. Well hell, suddenly not only did I waste a lot of time cracking that encryption for nothing, but I would assume (possibly mistakenly) that you very well might not have anything to hide, and there is no reason to specifically look into anything you are doing.
        Even if I don't assume that, and either assume or just know that you DO have something to hide... Well as a hacker, where would I start? I don't have all the time and processing power in the world to brute force everything you do. I would always be very behind your 'now' traffic. By the time I eventually did get to decrypting the part you really wanted hidden, it could be years or decades later. How much use would that data be so long after the fact? More often than not, the older the data, the less useful it is.

        Encrypt everything. Nothing looks suspicious and out of the norm, so if/when you do something that you do want/need hidden from hackers, a hacker wouldn't even know it happened let alone know where to start looking for it.

        Not encrypting everything just paints a huge target on the exact data you are wanting to hide in the first place.

        • If the encryption is that easily crackable, then it signals a need for increased encryption. What you are advocating is security through obscurity. Sorry.
        • Re: (Score:3, Insightful)

          by cortesoft ( 1150075 )

          You are exactly right. This is for the very same reason that we need to start making encryption standard for everyone; if your scenario was to take place under current circumstances, you would already be under suspicion and under greater focus since most people don't encrypt everything... when everyone encrypts everything, it will finally be the case that no pattern can be deduced from the presence of encrypted data

        • Re: (Score:3, Insightful)

          by John Hasler ( 414242 )

          > Not encrypting everything just paints a huge target on the exact data you
          > are wanting to hide in the first place.

          Right. So just encrypt the kitten videos and send lots of tantalizing stuff in the clear. That'll fix 'em.

    • by Anonymous Coward

      The day someone implements DNSSEC based server key delivery in a popular browser, there will be a grass-roots effort to make your dream come true.

      • Re: (Score:2, Interesting)

        How big an effort is that to do in, say, WebKit? Firefox? Why isn't anyone working on it? Or are people? What are the benefits?

        Forgive my ignorance, I truly didn't know. Is it something that a few thousand dollars of programming time would buy?

    • Since when is HTTP(S) “everything”? Maybe for those who have never seen something else than HTML and webapps.

      Just set up VPN-like connections. Or think it to the end, and use a Darknet by default. ;)

    • Re: (Score:2, Interesting)

      by roju ( 193642 )

      How do you effectively search your email history if it's all encrypted? Are there algorithms for indexing encrypted data without giving too much away?

  • I wonder if this has anything to do with the reports of Chinese users having their accounts hacked?

    Really? No, I'm sure it's just a coincidence.

  • by giladpn ( 1657217 ) on Wednesday January 13, 2010 @05:57PM (#30757670)
    OK, better late then never. Good that Google has finally introduced HTTPS as a default.

    Now the next feature we all need is encryption of the content of our data when it is at rest on disks in Google's data center. That way even Google employees cannot read our mail. Not for serving up ads. Not for any reason whatsoever.

    And after that, Facebook and Twitter...

    Nah, I'm dreaming.
    • by mlts ( 1038732 ) *

      Hushmail does exactly this. If you use the Java (as opposed to the Javascript/SSL) client, the only place E-mail gets decrypted is on your personal computer. I use Hushmail for both secure E-mail (PGP encrypted), as well as aliases that I can dispose of, such as when I'm posting to Craigslist and only want the address to last the duration of the buy/sell/work transaction.

      (Yes, Hushmail did have to give information to LEOs a couple years ago, but that doesn't mean that anyone and everyone has access to one

  • Not through sniffing (Score:5, Informative)

    by Charles Dodgeson ( 248492 ) <jeffrey@goldmark.org> on Wednesday January 13, 2010 @06:00PM (#30757712) Homepage Journal
    Apparently the two compromised accounts were because of "access a system used to help Google comply with search warrants by providing data on Google users." I've blogged [blogspot.com] about this. And my source for all of that is from an article [computerworld.com] in Computer World.
  • by vinn01 ( 178295 ) on Wednesday January 13, 2010 @06:03PM (#30757740)

    Anyone care to guess if Yahoo! will so the same thing?

    I really hope so. I use a Yahoo account and I know how easy it is to sniff Ethernet. I hate to read mail at cafes and other places where I'm not certain of the LAN security.

    • by shish ( 588640 ) on Wednesday January 13, 2010 @07:52PM (#30759226) Homepage

      I hate to read mail at cafes and other places where I'm not certain of the LAN security.

      Weird, I love reading mail at insecure cafes... you can sit in the corner and play games like "match the email to the person" and "convince the businessman that you're a replacement representative for his meeting" :-)

  • No Brainer (Score:3, Interesting)

    by fm6 ( 162816 ) on Wednesday January 13, 2010 @06:03PM (#30757742) Homepage Journal

    Encryption has some overhead, but so what? It's not like modern hardware isn't up to it.

    Anybody who cares about security has stopped using open protocols to send sensitive data. FTP is out, SFTP is in. Goodbye Telnet, hello SSH. And anybody who sends passwords over an open HTTP, SMTP, or IMAP connection is begging to be hacked. (POP? You're still using POP?) The issue is not security versus performance, it's the usual case of people not going to the trouble of upgrading their technology until they can't ignore the problem any more.

    As usual, Google leads the pack in creating groundbreaking technology, and comes in dead last in dealing with the boring stuff, like dealing with security issues, or making sure you the resources to properly support your latest product. They need to hire fewer geniuses and start hiring more ordinary drudges with the patience to make things work in the real world.

    • Re: (Score:3, Insightful)

      by asserted ( 818761 )

      > As usual, Google leads the pack in creating groundbreaking technology, and comes in dead last in dealing with the boring stuff, like dealing with security issues

      and now you show me another free mail service of any significance that has IMAPS, POP3S, SMTPS and now HTTPS (yes, all with *S, because Gmail requires you to use SSL for SMTP, POP3 and IMAP, and has been doing so since the very beginning, HTTPS was available for use for a while, though not required or offered by default).
      if google is dead last,

      • Re: (Score:3, Interesting)

        by fm6 ( 162816 )

        Yeah, GMail is pretty good — now. Do you recall that it was in beta mode for 3 years? Any other software company would have hired some QA people and gone final in 6 months. But QA is boring, and beneath the dignity of the geniuses they insist on hiring.

        I have a Google Voice account. If it were a mature product, I'd switch over in a heartbeat — it's got tons of free features that I'm currently paying PhoneTag and Skype to receive. But the UI is cranky and tends to freeze, and there are a few othe

  • Wait, what? (Score:2, Redundant)

    'We initially left the choice of using it up to you because there's a downside: https can make your mail slower since encrypted data doesn't travel across the web as quickly as unencrypted data.'

    Huh? Encrypted bits are asthmatic and can't run as fast as unencrypted ones? Coming from someone at Google this statement is quite the WTF. Is it too technical now to say that encrypting data requires extra calculations which introduce delays so gmail will respond somewhat slower?

    • by Fishbulb ( 32296 )

      Yeah, I thought the same thing. Being that several years ago my coworkers determined that using sftp (or ftp through stunnel? - I forget) added slight compression as well as encryption over regular ftp. So, even though a secure transfer was unnecessary (public weather data) and despite the cpu hit, we'd actually be saving quite a lot in bandwidth since the data was on the order of terabytes.

      The best reference to this I could find was this wikipedia article [wikipedia.org].

    • by shish ( 588640 )

      Is it too technical now to say that encrypting data requires extra calculations

      Speaking as someone who has recently been providing tech support for his mother -- yes, that is *far* too technical for the average non-IT person :-(

  • by Omeganon ( 104525 ) on Wednesday January 13, 2010 @06:22PM (#30757966)

    'Only two Gmail accounts appear to have been accessed, and that activity was limited to account information (such as the date the account was created) and subject line, rather than the content of emails themselves,' said David Drummond in that blog update. That does sound like it perhaps could be a result of insecure HTTP traffic being intercepted in transit between the users and Gmail's servers.

    No, if that were the case they would have been able to see *everything* the user received as part of the data response, including message bodies.

    • by Temporal ( 96070 )

      No, if that were the case they would have been able to see *everything* the user received as part of the data response, including message bodies.

      Unless the user only looked at their inbox without opening any particular message.

  • pochta.ru / smtp.ru (Score:3, Informative)

    by xororand ( 860319 ) on Wednesday January 13, 2010 @06:36PM (#30758212)

    Some free mail providers have been offering HTTPS for a long time, for example the Russian https://www.pochta.ru/ [pochta.ru] . Their web mail interface is decent too. Unfortunately they've been bought out by or merged with "qip" and have dropped their English language option since. It's still usable though and a good option if you need a free mail account with secure authentication outside of the western countries for some reason.

  • So does Wikipedia... (Score:3, Informative)

    by cffrost ( 885375 ) on Wednesday January 13, 2010 @06:55PM (#30758510) Homepage
    ...if you begin with the right URL. [wikimedia.org]
  • by kindbud ( 90044 ) on Wednesday January 13, 2010 @06:57PM (#30758522) Homepage

    I removed the Gmail gadget for iGoogle from my iGoogle homepage, because despite the iGoogle being loaded via HTTPS, the Gmail gadget would use plain HTTP.

    Have they changed the Gmail Gadget to also use HTTPS? I couldn't find anything about it.

  • Dont’ you mean IMAPS and SSMTP?

  • by metrometro ( 1092237 ) on Wednesday January 13, 2010 @07:07PM (#30758666)

    "Only two Gmail accounts appear to have been accessed"... by attacking Google systems directly. Using other methods, the attackers were highly successful.

    Google disclosed that upon investigating users suspected of being attacked, they found "dozens" of Chinese human rights activists who had been compromised through phishing, malware or other systems that allowed security forces (presumably) to read their mail via a valid authentication. So, while Google itself may be mostly reliable on the backend, the security ecosystem as a whole is deeply flawed.

    Google: "as part of this investigation but independent of the attack on Google, we have discovered that the accounts of dozens of U.S.-, China- and Europe-based Gmail users who are advocates of human rights in China appear to have been routinely accessed by third parties. These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users' computers."
    http://googleblog.blogspot.com/2010/01/new-approach-to-china.html [blogspot.com]

    So go change your passwords.

  • Is it obvious to everybody that encrypting everything is good only for privacy but doesn't seem to add much to security when compared to encrypting just the authentication data then using a session ID? Or rather, could the gurus please clarify where's the security increase in putting everything over https?

  • Ouch. (Score:3, Funny)

    by machine321 ( 458769 ) on Wednesday January 13, 2010 @07:15PM (#30758778)

    encrypted data doesn't travel across the web as quickly as unencrypted data

    That just hurts my brain.

    • Re: (Score:3, Interesting)

      by jimicus ( 737525 )

      encrypted data doesn't travel across the web as quickly as unencrypted data

      That just hurts my brain.

      Actually, that is possible. Encrypted data doesn't generally compress as well as plaintext, and it's quite common for web servers to compress data before sending it to the client.

  • by TheSync ( 5291 ) on Wednesday January 13, 2010 @07:42PM (#30759118) Journal

    If they make Google Apps HTTPS only, I'll be screwed, because my little embedded devices can't handle HTTPS stack.

    • Re: (Score:3, Informative)

      In TFA:

      If you trust the security of your network and don't want default https turned on for performance reasons, you can turn it off at any time by choosing "Don't always use https" from the Settings menu.

  • by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Wednesday January 13, 2010 @07:55PM (#30759262) Journal

    We initially left the choice of using it up to you because there's a downside: https can make your mail slower since encrypted data doesn't travel across the web as quickly as unencrypted data.

    Bullshit.

    Ok, maybe it's true, but it seems much more likely that this was about them conserving CPU, not about you getting your email faster. That would be why it's taken until now for them to take this step.

    Of course, it's still fairly useless if I stay logged in -- then my session could still be hijacked from vanilla Google searches...

  • What about slashdot? (Score:5, Interesting)

    by ratboy666 ( 104074 ) <fred_weigel@[ ]mail.com ['hot' in gap]> on Wednesday January 13, 2010 @07:57PM (#30759288) Journal

    I really want EVERY site I visit to use https. Why doesn't slashdot?

    • Re: (Score:3, Insightful)

      Because there's no reason to. What are you trying to protect, valuable mod points?

      Oh, and don't say "I want to encrypt everything, so the hackers don't know what's important". HTTPS doesn't hide the IP you're accessing. If you want that kind of protecting, you should get a secure VPN or Tor.

      • Re: (Score:3, Interesting)

        by Deanalator ( 806515 )

        What is SSL complicated or something?

        Why even have logins at all? Why require passwords? Why not let anyone post under whatever name they want?

        Slashdot is a service with accounts and authentication, all of which is made useless when nothing is encrypted. People said the same bullshit about freenode, and then lilo got his password popped because he logged into freenode, in cleartext, at a coffee shop, and the GNAA ran freenode for a week. Remember that? And freenode still doesn't support encryption.

        I wo

Technology is dominated by those who manage what they do not understand.

Working...