Why spend the silly prices for an EV cert when a free cert from Lets Encrypt will do the same just fine.I love Cloudflare, my only gripe with Cloudflare is that you must be a business user $200 a month+ to have EV Certificates (Green URL in browsers).
Why spend the silly prices for an EV cert when a free cert from Lets Encrypt will do the same just fine.
Pretty sure that Lets Encrypt free certs are not GREEN URL Compatible
I think Mick might have used the wrong term, maybe they were thinking of DV certificates where your company information is displayed in the padlock area?And that would be a false assumption.
All of Lets Encrypts certs will provide the green padlock and "secure" - exactly how google.com looks.
That's incorrect as well. A DV cert is Domain Verified, a DV cert will not show your company name. An EV (extended validation) cert will, however that's not what Google uses. In his last example, apple.com - they do use an EV cert. Both an EV and DV cert will give you a green padlock and a DV cert will give you the green "secure" - just like google.maybe they were thinking of DV certificates where your company information is displayed in the padlock area?
They do use Cloudflare:Why does Xenforo, it's own forum not migrate to Cloudflare?
What changes would you like to see? Serving javascript, avatars, and attachment thumbnails over (origin pull) CDNs is already supported.I would like to see they will optimize it more for CDN use.
No, he's correct.. there is a difference between thisAnd that would be a false assumption.
All of Lets Encrypts certs will provide the green padlock and "secure" - exactly how google.com looks.
Wasn't sure if you understood the "why" since you askedYup I think we already got that part sorted. ha.
On a larger commercial entity it does make a difference on the users feeling of "security" as they know they aren't on some phishing site.I'm not trying to prove anyone wrong or right. Simply asking why spending the extra on the EV? But now I know, you simply want your company name up there I guess.
They do use Cloudflare:
View attachment 173015
What changes would you like to see? Serving javascript, avatars, and attachment thumbnails over (origin pull) CDNs is already supported.
um sure?On a larger commercial entity it does make a difference on the users feeling of "security" as they know they aren't on some phishing site.
Extended Validation certificates are intended to show the user more visibly the institution to which they were issued. The technical aspects of the certificates themselves is combined with visual clues in the user interface of the application verifying them: the green bar and a visible name next to the location bar in the browser.
For example, the EV certificate at http://www.paypal.com/ will make the browser show a green bar and display "PayPal, Inc." next to it. This is designed not only to link the certificate to the domain owner (like standard domain-validated certificates do), but also link it to a more physical institution (here, PayPal, Inc.). To do this, the CA must verify that the named institution is indeed the one owning the domain.
Ultimately, this is more about making a more authenticated link between the domain name and the company name than making "more secure" certificates. From a cipher suite point of view (which is what determines the encryption algorithm and key size), EV certificates are no different from DV certificates (blue bar).
Stepping back a little, you need to realise that the effectiveness of HTTPS relies on the user checking that it's used correctly. (The server has no way to find out whether the client is victim of a MITM attack otherwise, unless using client-certificates too.) This means that the users have to:
EV certificates are intended to solve that last sub-point. If you already know that amazon.combelongs to Amazon.com, Inc. or that google.com belongs to Google Inc., you don't really need them.
- check that HTTPS is used when they expect it to be,
- check that there are no warnings,
- check that the website they're using is indeed the one they're intending to visit, which leads to a couple of sub-points:
- checking that it's the domain name they expect,
- checking that the domain name belongs to the company they expect.
I'm not personally convinced that this approach completely works, since they can be misused (see NatWest/RBS example below) and some CAs seem to propagate vague (and potentially misleading) information as to what they really are, in an effort to promote them.
In general, if your users already know that your domain name is yours, you don't really need one.
I think you're giving the user way to much credit. I truly don't believe most end users could tell you the difference between an EV or DV certificate.It ultimately depends on how safe that company/corporation desires to make their users feel.
We use essential cookies to make this site work, and optional cookies to enhance your experience.