Strictly enforcers: https://chrome.google.com/webstore/detail/prefer-https/fphhhpkcchihkmmgifhdnhmpfadpmelo https://chrome.google.com/webstore/detail/kb-ssl-enforcer/flcpelgcagfhfoegekianiofphddckof Related: https://chrome.google.com/webstore/detail/saferchrome/lgpkjjingioekjianemgdobchenebhek https://chrome.google.com/webstore/detail/unencrypted-password-warn/mjpinemnkjlppmemjfabdaelpfgfjgkj https://chrome.google.com/webstore/detail/passwordfail-extension/ockgeenjbijlgilppfieaklfopnbdpge
I know about KB but not sure how good it is. Prefer HTTPS hasn't been updated since 2011 but it uses very little RAM. I think i'll try SaferChrome first. Thanks EDIT: I really like SaferChrome so far, it is using 16,000K currently. Why doesn't Wilders (and similar forums like malwaretips) have HTTPS?
Glad to know it works. Wilders does have HTTPS, but with a self-signed certificate. Just add the s to http and it'll work.
That's Chrome's default behaviour. If you copy and paste from the address bar (without re-selecting), you will notice this: https://www.wilderssecurity.com/threads/ssl-enforcer-chrome.379830/ I thought it was fairly obvious, but just add https:// in front of www. Also, aren't there rules in SafeChrome you can make/edit?
You'll have to talk to the admins about that: https://www.wilderssecurity.com/threads/new-ssl-certificate-being-installed-still-self-signed.374852/
Also, realize that https is not a magic pill. It is still able to be taken hostage by MITM adversaries. I personally prefer to use a confirmation that the certificate fingerprint in my browser exactly matches the correct one for here (using Wilders just as an example). Only the person/site holding the entire keyset can produce this fingerprint on my browser. A MITM or bad exit node cannot produce this regardless of how good the imposter looks with its pageload. 02:D8:E3:1E:75:96:BD:3F:89:47:6A:38:98:6D:65:CC:58:E7:C0:B2:64:56:97:47:50:A3:DA:4E:C4:B3:CF:57