Let TLS Wait [Paid] [Deleted]

CPanel and Plesk both provide free SSL/TLS certificates. If you have shell access, you can add a LetsEncrypt certificate for free. There are so many options for adding certificates. Stay away from this add-on.
 
This add-on is for those who are either late or unable to enable SSL on their boards.
Not all shared hosting providers update their Control Panels to support Let's Encrypt. Some people rather pay 15 Euros than many times that amount.

If you can/want/need support SSL on your site (e.g. from an alternative free CA), I don't see a reason why not.
 
This add-on was not created to game the search engine rankings, thus your comment about it being more black hat than grey is inaccurate and insulting.

Well considering what was said below...

will this trick the google bot too?

99% Yes. For the 1% possibility that it doesn't, there'll be another solution.

And knowing Google will penalize you for not having HTTPS, it could be considered a sort of black hat.
 
I missed this addon. Is this spoofing SSL connections? If so: will this not trip up various security & anti scripts including malware blacklisting?
 
I missed this addon. Is this spoofing SSL connections? If so: will this not trip up various security & anti scripts including malware blacklisting?

It changed the input fields so that chrome would not know they were for login details and there for would not show the appropriate warnings. Which once people get used to seeing such things will just be one more thing to look out for on phishing sites yay.
 
It changed the input fields so that chrome would not know they were for login details and there for would not show the appropriate warnings. Which once people get used to seeing such things will just be one more thing to look out for on phishing sites yay.
Why wouldn't a phishing page use a simple type=password input with free SSL?
 
Why wouldn't a phishing page use a simple type=password input with free SSL?

I would venture to guess the same reason MANY attacks I have blocked were using http 1.0 which is easy to block since all legitimate traffic to my server is capable of utilizing http 1.1. What is a little bit of code or time so that your traffic isn't so easy to pick out?
 
Top Bottom