Protection against untrusted certificates
Yandex Browser for Mobile checks site certificates. The browser will warn you if the website cannot provide secure encryption of your data due to problems with the certificate.
Why websites need a certificate
Your personal data and payment information should be protected when you send them to a website. Websites use the HTTPS protocol for secure connection. The protocol activates an asymmetric encryption algorithm, where data is encrypted with a public key and decrypted with a private key. For each session, the browser regenerates the private key and transmits it to the website in addition to taking precautionary measures to prevent theft.
However, if you end up on a phishing website, it might get the private key and then decrypt your data. To protect against phishing, websites use digital certificates issued by special certification authorities. The certificate guarantees that the encryption keys actually belong to the website owner.
What makes an untrusted certificate dangerous
You may end up on a phishing website, or your data will not get the necessary protection on the original website (for example, if the website's certificate has expired). As a result, hackers can:
Block websites with untrusted certificates
If the site can't guarantee safe encryption due to problems with the site's certificate, the site page won't open and you'll see in the SmartBox and a warning that a safe connection could not be established. In this case you can decide to either not visit the site, or add the certificate to your list of trusted ones.
Tap Details, then tap Make an exception for this site. The certificate will stay on the trusted list for 30 days, and then you will have to make it an exception again.
Reasons for blocking
Yandex Browser blocks websites that have the following certificate problems:
- Your data may become available to unknown application developers.
- The certificate may be installed by malware pretending to be the application. Modern browsers do not know how to verify the authenticity of certificates installed by special applications.
The certificate might have been installed by a hacker or special software. Ad blockers and similar applications may replace website certificates with their own certificates. If the certificate was installed by an application, you need to find it and disable checking HTTPS in it.
You can also decide to trust your data to such a certificate, but be aware of two potential dangers:
The site certificate is issued by the site itself, rather than by a certification authority. To find out more, see Self-signed certificate. Malware or hackers can intercept your data.
The certificate key does not match the pinned website key. Hackers may try to replace the root certificate. Then they can intercept your data. To find out more about pinning (linking) a key, see HTTP Public Key Pinning.