<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-03-31T21:29:00+00:00</dc:date>

	
	<item>
		<title> HTTPS Web Hijacking Goes From Theory to Practice (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20090219_https_web_hijacking</guid>
		<link>https://circleid.com/posts20090219_https_web_hijacking</link>
		<description><![CDATA[I've been privately talking about the theoretical dangers of HTTPS hacking with the developers of a major web browser since 2006 and earlier last month, I published my warnings about <a href="http://www.circleid.com/posts/20090105_problem_with_https_ssl_md5/">HTTPS web hacking along with a proposed solution</a>. A week later, Google <a href="http://formortals.com/Home/tabid/36/EntryID/151/Default.aspx">partially implemented some of my recommendations</a> in an early Alpha version of their Chrome 2.0 browser... This week at the Black Hat security conference in Washington DC, Moxie Marlinspike released a tool called SSL Strip... <a href="https://circleid.com/posts20090219_https_web_hijacking">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> The Problem With HTTPS SSL Runs Deeper Than MD5 (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20090105_problem_with_https_ssl_md5</guid>
		<link>https://circleid.com/posts20090105_problem_with_https_ssl_md5</link>
		<description><![CDATA[The recent <a href="http://www.win.tue.nl/hashclash/rogue-ca/">research</a> highlighting the alarming practice of Secure Socket Layer (SSL) Certificate Authority (CA) vendors using the MD5 hashing algorithm (which was known to be broken since 2005) has shown a major crack in the foundation of the Web. While the latest research has shown that fake SSL certificates with MD5 hashes can be forged to perfection when the CA (such as <a href="http://erratasec.blogspot.com/2008/12/not-all-md5-certs-are-vulnerable.html">VeriSign's RapidSSL</a>) uses predictable certificate fields, the bigger problem is that the web has fundamentally botched secure authentication. <a href="https://circleid.com/posts20090105_problem_with_https_ssl_md5">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>