recommended reading

What is HTTPS and Why Does Google Like it So Much?


Google has announced it will give sites using encryption a higher rank in its search algorithms. Particularly, it singled out HTTPS, which it characterizes as “industry-leading security.”

It’s easy to tell if a site is using the system: A URL that starts https:// instead of http:// is using it. HTTPS, which stands for Hypertext Transfer Protocol Secure, makes it more difficult for hackers, the NSA, and others to track users. The protocol makes sure the data isn’t being transmitted in plain-text format, which is much easier to eavesdrop on.

What’s more, it piggybacks on the more-familiar HTTP, and most browsers support it. It’s particularly important for use in public wireless networks, where bad actors can easily discover sensitive information by “packet sniffing”—programs that can see all the information transmitted over an unencrypted network.

HTTPS is already the default for Google sites, which scrambles data as it travels from Google’s servers to the user’s computer. It was introduced as the default for Gmail, its webmail service, in 2011. The change in algorithm gives leverage to a speech a few months ago, in which Pierre Far, a trends analyst, and Ilya Grigorik, a developer advocate, called for HTTPS everywhere. So far, only about 25% of the web uses the protocol.

“All communication should be secure by default,” Far said in the video.

Why? Well, all of the metadata from websites, when combined, compromise users’ privacy. In September 2013, top-secret documents leaked by Edward Snowden revealed that the NSA was storing gathered metadata on US citizens in order to create profiles of people, tracking their known associates, preferences, and even locations at certain times. In May, the former head of the NSA, Michael Hayden, admitted that government-collected metadata had been used to kill people—though he denied that the collection of data on Americans was used that way.

HTTPS isn’t foolproof, though. If the certificates—a way for websites to confirm that they are who they say they are—are compromised, bad actors still have access to your data. The Heartbleed bug targeted a vulnerability in these security certificates and compromised about 500,000 websites.

For now, Google is using HTTPS as “very lightweight signal—affecting fewer than 1% of global queries, and carrying less weight than other signals such as high-quality content.” That will likely change in the future, Google said. “We’d like to encourage all website owners to switch from HTTP to HTTPS to keep everyone safe on the web,” the company said in its blog post.

To encourage its adoption, Google will be publishing its best practices in the days to come. With Google’s oomph behind it, HTTPS may be powering the web of the future.

Reprinted with permission from Quartz. The original story can be found here

(Image via wk1003mike/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.