Quote:
Originally Posted by Hank
It just seems odd that something sitting at the ISP level would not be able to say https:\\aphishsite.com or https\\xxx.xxx.xxx.xxx when requested is a phishing site on their list (disregarding for the moment how complete that list is)
I confess to not knowing enough in this area though!
Hank
|
Cryptography is often counterintuitive. Think of it this way: The way https was designed was to hide as much information as possible from eavesdroppers. If you visit
https://www.example.com/path/file.php?do=something_bad then all that gets sent unencrypted is
www.example.com*.
www.example.com might be a legit site but with a poorly coded page that allows it to be used as part of a phishing attempt.
* Note: This isn't technically correct. That probably isn't even sent (unless you're using an up to date browser supporting Server Name Indication - in which case it'll likely also have a built in phishing filter). Instead the ip address for that domain is. Although to look up that address
www.example.com is sent unencrypted to a DNS server.
I'm trying to keep it simple though.