Skip to content

Browser web extension that checks a site's TLS certificate fingerprint.

Notifications You must be signed in to change notification settings

nearwood/https-canary

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HTTPS Canary

Wondering if your ISP is jumping in on your TLS connections?

This loads the certificate fingerprint of the site you are visiting, and can then verify that against the fingerprint obtained via a trusted 3rd party.

Currently uses (read: scrapes) GRC.com's fingerprinting page.

Not to be confused with: https://tlscanary.mozilla.org/

TODO

  • When cname matches tab URL use that sha1
  • Click verify to request from GRC
  • Show green thing if good, red thing if bad
  • It's not pretty
  • The code is not pretty

Releases

No releases published

Packages

No packages published