this post was submitted on 30 Jul 2023
37 points (93.0% liked)
Programming
17408 readers
177 users here now
Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!
Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.
Hope you enjoy the instance!
Rules
Rules
- Follow the programming.dev instance rules
- Keep content related to programming in some way
- If you're posting long videos try to add in some form of tldr for those who don't want to watch videos
Wormhole
Follow the wormhole through a path of communities !webdev@programming.dev
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Hmmm, hosting a hacker post without an https url... 🤨
Given that the Jargon File / Hacker's Dictionary predates https by at least 20 years and is not remotely sensitive information, I don't think it's a problem.
https://en.wikipedia.org/wiki/Jargon_file
http://www.catb.org/~esr/jargon/
P.S. This entry in particular might be informative:
http://www.hackersdictionary.com/html/entry/hacker.html
Maybe I'm wrong, but using http could create a MITM vulnerability.
And for me this issue is my browser is setup to block http URLs. It's just not a good look.
You are. The only way it "creates a MITM vuln" is if you're entering sensitive information into the site, which you're not.
It does create a MITM vulnerability, the question is just whether it matters or not. With HTTPS a third party will only know which url you're accessing. With HTTP they can see exactly what data is transferred and can modify that data at will.
So adding HTTPS here accomplishes:
None of these are really an issue, so using http in this situation is fine. In general though, I'd consider not having HTTPS as a bug for most sites, unless you're extremely resource constrained on either side of the connection and you think carefully about the security and privacy implications