Conversation

Replying to and
This is a standard Chromium feature but maybe they changed it to using an HTTPS server not providing a reliable time. IIRC, it's permitted to return a randomized value in the time value, so you really need to use a server that's explicitly going to keep supporting giving time.
1
1
Replying to and
You're misunderstanding what I'm saying. I'm not talking about the server you're connecting to but rather a server (or multiple) for sanity checking the local system time. Essentially, a time server, but with the time fetched via TLS.
1
1
The most common source of HTTPS errors in Chrome was determined to be an out of sync local clock, so when it encounters a certificate with an invalid date (expired or issued in the future), it has support for sanity checking the local system time via TLS to provide a notice.
1
1
Brave might have changed the domain from a Google server to one that didn't offer a strong guarantee of providing a correct TLS handshake time value. The server they used might have ended up having the wrong time, or it might randomize the field, which I think became permitted.
1
1
It's important because instead of training the user to accept invalid certificates, they are informed that their system clock is wrong, which they can check themselves, as you did. So, it seems Brave broke this feature, but the feature itself is a useful and important one.
2
Replying to and
I wonder if better UX would be allowing easy bypass of the error, but: 1. showing site as insecure 2. disabling all cookies/localstorage for the site 3. disabling form entry/submission for the site 4. severe warning or blocking [executable] file download from site
2
Normally I bypass cert errors only when it's a purely informative site I have no login relationship with and don't intend to obtain dangerous content from. Seems browser could do a lot to assist with this for users who don't understand it.
2
Yeah, I linked to the source code here: twitter.com/DanielMicay/st Twitter is very bad at handling threads and making them readable / discoverable.
Quote Tweet
Replying to @RichFelker and @brave
Try typing "thisisunsafe". It's the current bypass for certificate errors on sites with HSTS: chromium.googlesource.com/chromium/src/+ I think it's part of the HSTS standard that it prevents bypassing certificate errors, but I think most browsers include a secret way to bypass it for devs.
1
2
Show replies