René's URL Explorer Experiment


Title: OTI Public Comment: OTI Supports the Proposed HTTPS-Only Standard · Issue #103 · GSA/https · GitHub

Open Graph Title: OTI Public Comment: OTI Supports the Proposed HTTPS-Only Standard · Issue #103 · GSA/https

X Title: OTI Public Comment: OTI Supports the Proposed HTTPS-Only Standard · Issue #103 · GSA/https

Description: Comments to the U.S. CIO on Proposed HTTPS-Only Standard for Federal Websites The CIO of the United States has proposed that all Federal government websites should support mandatory HTTPS encryption. The Open Technology Institute at New ...

Open Graph Description: Comments to the U.S. CIO on Proposed HTTPS-Only Standard for Federal Websites The CIO of the United States has proposed that all Federal government websites should support mandatory HTTPS encryptio...

X Description: Comments to the U.S. CIO on Proposed HTTPS-Only Standard for Federal Websites The CIO of the United States has proposed that all Federal government websites should support mandatory HTTPS encryptio...

Mail addresses
mccarthy@opentechinstitute.org
nat@opentechinstitute.org

Opengraph URL: https://github.com/GSA/https/issues/103

X: @github

direct link

Domain: github.com


Hey, it has json ld scripts:
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"OTI Public Comment:  OTI Supports the Proposed HTTPS-Only Standard","articleBody":"## Comments to the U.S. CIO on Proposed HTTPS-Only Standard for Federal Websites\n\nThe CIO of the United States has proposed that all Federal government websites should support mandatory HTTPS encryption.  The Open Technology Institute at New America wholeheartedly supports this proposal, which will significantly improve Americans’ privacy and security, and send a clear message that HTTPS protection should be considered a basic standard for all Web-based communications.\n\nThe websites of the Federal Government collectively house a vast quantity of important information about disability benefits, taxes, immigration, resources for veterans, Social Security, Medicare, workplace protections, and many other topics that may be highly personal in nature.  Americans need and have a right to expect easy access to such information, and in the 21st century that means making these resources available on-line. However, there are many significant risks associated with providing digital access to such essential, sensitive, and frequently-accessed government resources in a manner that does not protect the security and privacy of those requesting them. By requiring Federal web sites to use HTTPS by default, agencies will be acting proactively to protect Americans as they conduct their day-to-day business with the Federal government, while also serving as an example for state and local governments to follow.\n\nIn the two decades since it was first released, HTTPS has become the global industry standard for securing private information as it travels across the Internet.  Without HTTPS, many of today's most essential online services – ecommerce, online banking, digital medical record systems, etc. – would be unable to guarantee either the secrecy or the fidelity of the information they send to and receive from their users.  Such guarantees are basic protections that consumers have every right to expect from all institutions that gather their personal and financial information. The U.S. CIO’s proposal would simply compel all Federal web sites to meet the level of service that Americans already expect and receive from the private sector.\n\nHTTPS-enabled websites provide two critical protections over non-HTTPS sites: encryption and authentication. HTTPS encryption keeps the contents of a particular Web request or transaction secret, so that they cannot be accessed by anyone except the user and website exchanging the information. Even if the communication is intercepted by a third party, it will appear to be nothing but a jumble of random text. HTTPS authentication verifies that a website is actually associated with the person or organization it claims to represent, rather than by an impostor who set up the site to trick users into divulging personal information (known as a phishing attack).  By adopting a policy of using HTTPS by default, a website gives its visitors confidence that the information they are getting is coming from the web site they intended to visit, and is exactly what that website intended to send them.\n\nThese protections are no longer seen as “optional” or only for “certain kinds of data” (traditionally limited to passwords, credit card numbers and little else).  Indeed, encrypting all traffic on the Internet is increasingly seen as the only way for website owners to protect their users from diversion to imposter sites, or injection of malicious code. [Recent research demonstrates](https://citizenlab.org/2014/08/cat-video-and-the-death-of-clear-text/) that it is possible to infect a computer with malware by changing the contents of a legitimate but unencrypted website en-route.  Additionally, this past month [researchers discovered](http://www.nytimes.com/2015/04/11/technology/china-is-said-to-use-powerful-new-weapon-to-censor-internet.html) that non-encrypted traffic to common web sites is in fact already being altered en-route by foreign governments, in ways that have made visitors to these sites become unwitting contributors to distributed attacks on third-party websites. \n\nWithout HTTPS, data sent between a website and any of its visitors can be recorded or manipulated by anyone who has access to any part of the network path between the two parties. For the many Americans who often access the Internet via free WiFi hotspots found in coffee shops, airports and city streets, the network path includes anyone who happens to be concurrently using the same WiFi access point.  Many Americans also access the Internet from workplace and/or other institutional networks that are subject to comprehensive monitoring, a fact which can make it difficult or dangerous for users of the network to access a wide variety of important government resources. For example, researching OSHA violations from a workplace network could result in interrogation or retribution\n\nGiven the growing dangers associated with insecure Internet communications, it is more important than ever for Americans to know that traffic to and from U.S. Federal websites is not being intercepted, tampered with, or used as a vector for malware. The risks to personal privacy and security posed by a lack of universal support for HTTPS are significant, and the Federal government has both the means and the responsibility to lead the way in mitigating those risks.\n\nThe tools for implementing HTTPS support are widely available, the costs are minimal, and the best practices are widely documented, including [by the government itself](http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf).  What’s more, the cost of implementation will be particularly trivial for federal agencies since the government has already invested in all of the [required infrastructure for creating secure certificates](http://www.idmanagement.gov/federal-public-key-infrastructure).\n\nThe U.S. CIO’s proposal brings the Federal government in line with well-established best practices in the tech sector, and is a privacy and security win for all Americans. Additionally, in adopting the CIO’s recommendations the Federal government will take a leading role in bringing more attention to the need for universal HTTPS adoption, and the importance of continuing to maintain and improve the standard’s underlying technologies.  We strongly recommend the adoption of the HTTPS-only policy for Federal websites, and further encourage state and local governments to institute the same policy.  \n\nJordan McCarthy, Staff Technologist (mccarthy@opentechinstitute.org)\nNat Meysenburg, Staff Technologist (nat@opentechinstitute.org)\n\nThe Open Technology Institute at New America\n1899 L Street NW, Suite 400\nWashington, DC 20036\n","author":{"url":"https://github.com/natmey","@type":"Person","name":"natmey"},"datePublished":"2015-04-14T21:21:59.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":0},"url":"https://github.com/103/https/issues/103"}

route-pattern/_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format)
route-controllervoltron_issues_fragments
route-actionissue_layout
fetch-noncev2:89ed7fe1-a809-813f-a41d-88a106a920b6
current-catalog-service-hash81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114
request-id84CE:3D59DC:E6728:12C371:69718C42
html-safe-nonce01335c49dcdb311d8fce8448c68d1aba9336d508ba1f9519c5d215dcfefe2406
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiI4NENFOjNENTlEQzpFNjcyODoxMkMzNzE6Njk3MThDNDIiLCJ2aXNpdG9yX2lkIjoiMjcyMjA1Njk0MDAzOTUzOTc3OCIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9
visitor-hmaccb30b7c56b99abe25868f04bace3a49ad20ba59cb24907ae679e54f3556cdc3c
hovercard-subject-tagissue:68501195
github-keyboard-shortcutsrepository,issues,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location///voltron/issues_fragments/issue_layout
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/GSA/https/103/issue_layout
twitter:imagehttps://opengraph.githubassets.com/cd2fe9378301f6d3ebcf2a1ba34019b4122a19915671ab7d2d994232b18e45e9/GSA/https/issues/103
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/cd2fe9378301f6d3ebcf2a1ba34019b4122a19915671ab7d2d994232b18e45e9/GSA/https/issues/103
og:image:altComments to the U.S. CIO on Proposed HTTPS-Only Standard for Federal Websites The CIO of the United States has proposed that all Federal government websites should support mandatory HTTPS encryptio...
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
og:author:usernamenatmey
hostnamegithub.com
expected-hostnamegithub.com
None2b0f2f00499ad3dd2c21ad030a3c403edca54df20ea256f6517c6d8c4fa3a1a4
turbo-cache-controlno-preview
go-importgithub.com/GSA/https git https://github.com/GSA/https.git
octolytics-dimension-user_id643070
octolytics-dimension-user_loginGSA
octolytics-dimension-repository_id28724827
octolytics-dimension-repository_nwoGSA/https
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forkfalse
octolytics-dimension-repository_network_root_id28724827
octolytics-dimension-repository_network_root_nwoGSA/https
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release67235153f3c1514ed5f7dc469f138abc377bd388
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://github.com/GSA/https/issues/103#start-of-content
https://github.com/
Sign in https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2FGSA%2Fhttps%2Fissues%2F103
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2FGSA%2Fhttps%2Fissues%2F103
Sign up https://github.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E%2Fvoltron%2Fissues_fragments%2Fissue_layout&source=header-repo&source_repo=GSA%2Fhttps
Reloadhttps://github.com/GSA/https/issues/103
Reloadhttps://github.com/GSA/https/issues/103
Reloadhttps://github.com/GSA/https/issues/103
GSA https://github.com/GSA
httpshttps://github.com/GSA/https
Notifications https://github.com/login?return_to=%2FGSA%2Fhttps
Fork 95 https://github.com/login?return_to=%2FGSA%2Fhttps
Star 280 https://github.com/login?return_to=%2FGSA%2Fhttps
Code https://github.com/GSA/https
Issues 16 https://github.com/GSA/https/issues
Pull requests 11 https://github.com/GSA/https/pulls
Actions https://github.com/GSA/https/actions
Projects 0 https://github.com/GSA/https/projects
Security Uh oh! There was an error while loading. Please reload this page. https://github.com/GSA/https/security
Please reload this pagehttps://github.com/GSA/https/issues/103
Insights https://github.com/GSA/https/pulse
Code https://github.com/GSA/https
Issues https://github.com/GSA/https/issues
Pull requests https://github.com/GSA/https/pulls
Actions https://github.com/GSA/https/actions
Projects https://github.com/GSA/https/projects
Security https://github.com/GSA/https/security
Insights https://github.com/GSA/https/pulse
New issuehttps://github.com/login?return_to=https://github.com/GSA/https/issues/103
New issuehttps://github.com/login?return_to=https://github.com/GSA/https/issues/103
#108https://github.com/GSA/https/pull/108
OTI Public Comment: OTI Supports the Proposed HTTPS-Only Standardhttps://github.com/GSA/https/issues/103#top
#108https://github.com/GSA/https/pull/108
Public Commenthttps://github.com/GSA/https/issues?q=state%3Aopen%20label%3A%22Public%20Comment%22
https://github.com/natmey
https://github.com/natmey
natmeyhttps://github.com/natmey
on Apr 14, 2015https://github.com/GSA/https/issues/103#issue-68501195
Recent research demonstrateshttps://citizenlab.org/2014/08/cat-video-and-the-death-of-clear-text/
researchers discoveredhttp://www.nytimes.com/2015/04/11/technology/china-is-said-to-use-powerful-new-weapon-to-censor-internet.html
by the government itselfhttp://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf
required infrastructure for creating secure certificateshttp://www.idmanagement.gov/federal-public-key-infrastructure
Public Commenthttps://github.com/GSA/https/issues?q=state%3Aopen%20label%3A%22Public%20Comment%22
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.