OH2

They're using LetsEncrypt, which is a really common free SSL certificate provider supported by all major browsers and totally automated. The problem is that LetsEncrypt was one of the first CAs (certificate authority) to cut their certificate lifespans down to 90 days. Unfortunately, it appears this hasn't happened since April. My guess, their automation broke or they're just not doing the replacement. Brave and a few other browsers will allow you to click thru the expired certificate warnings, but I believe Safari, Chrome, etc will just NOT without some settings tweaks.

Edited to add: and if you look at the time stamps on the cert issue date, they're from 4:40AM Central time. That says to me some poor ops guy doing it in the middle of the night, not automation.

(Cybersecurity inside baseball: All the browser makers were planning on cutting from 2 year to 1 year to 180 days to 90 days down eventually to one day lifespan to force sites to automate their renewals, for safety. It wouldn't matter if a private key was compromised with more key rotation. This also ties in with a broader move to ephemeral ciphers and perfect forward secrecy, it's all about making sure certain intelligence agencies everyone thinks are totally off the leash from reading all our internet traffic. Lots of interesting speculation around quantum computing as well.)
^^^thank you for your informative post!

Eccie uses Let's Encrypt certificates.
I agree and some(trolls) who put every thing down that's not About ECCIE will just post negative things about PP.
If I have seen(YOU) I will give a refes . Might want to check out my next tour soon I can get you on PP Originally Posted by LustyBustyGina38FF

haha when's he coming back now? LOL
^^^thank you for your informative post!

Eccie uses Let's Encrypt certificates. Originally Posted by saustin

Depends XXL adult diapers!


Both will hold the poop in to a certain point, and the the defecation hits the automation!


Bwahahahahaha!
Depends XXL adult diapers! Originally Posted by Anonymous01
Sharing your personal hygiene is TMI for me.
^^^thank you for your informative post!

Eccie uses Let's Encrypt certificates. Originally Posted by saustin
Everyone should! ACME protocol is a great advance in security that everything should support. I'm looking at you Microsoft!!!
Perhaps Acluesless1 will absorb your knowledge. Thanks for sharing!
TinMan's Avatar
Actually, your statement is incorrect. They have a valid security Certificate. The hackers have created a virus (I suppose a virus) that send the message and blocks the site and so far they have not been able to defeat the programming creating the problem, as I understand it. Originally Posted by Gandalf4301
They're using LetsEncrypt, which is a really common free SSL certificate provider supported by all major browsers and totally automated. The problem is that LetsEncrypt was one of the first CAs (certificate authority) to cut their certificate lifespans down to 90 days. Unfortunately, it appears this hasn't happened since April. My guess, their automation broke or they're just not doing the replacement. Brave and a few other browsers will allow you to click thru the expired certificate warnings, but I believe Safari, Chrome, etc will just NOT without some settings tweaks.

Edited to add: and if you look at the time stamps on the cert issue date, they're from 4:40AM Central time. That says to me some poor ops guy doing it in the middle of the night, not automation.

(Cybersecurity inside baseball: All the browser makers were planning on cutting from 2 year to 1 year to 180 days to 90 days down eventually to one day lifespan to force sites to automate their renewals, for safety. It wouldn't matter if a private key was compromised with more key rotation. This also ties in with a broader move to ephemeral ciphers and perfect forward secrecy, it's all about making sure certain intelligence agencies everyone thinks are totally off the leash from reading all our internet traffic. Lots of interesting speculation around quantum computing as well.) Originally Posted by dfwtallwmafdom
Finally, some information that makes sense!

This likely explains why from April until November or December (whenever the latest issues were reported) I was able to get secure connections every 2-4 attempts, with the other attempts resulting in the security warning from Safari. I thought there must be a valid certificate if I was able to get through without bypassing the warning, typing “http” vs “https”, or some of the other workarounds people use to get through.

For those using Puffin mobile to access oh2, are you folks making sure you’re getting secure connections, or are you not worrying about it? I’m also curious if one of the folks who seem to be knowledgeable about cybersecurity can answer the question if Puffin is a safe alternative to access oh2 (I.e., better able to reliably provide a secure connection thanks to the way the browser works) or just another workaround.
TexTushHog's Avatar
Everyone should! ACME protocol is a great advance in security that everything should support. I'm looking at you Microsoft!!! Originally Posted by dfwtallwmafdom
I’ve always been skeptical of ACME after watching the roadrunner. Never did too much for the coyote.
ntxguy's Avatar
I’ve always been skeptical of ACME after watching the roadrunner. Never did too much for the coyote. Originally Posted by TexTushHog
We could ask WEC but he's on vacation again.
Euphemia's Avatar
I'm posting this here because it is just not ladies that get these texts/emails etc

It didnt take this fool long to jump on the bandwagon of a fallen site..

Got a text from 214-736-4663 asking me what my location is, so i give the general location..

I then get a text from them

hi phemie, oh2 down again? Try us instead https://ourhome4.net . Existing members of P411/ecie/oh2 get automatic activation. Thanks!

Beware of what you click...
Ralph Fults's Avatar
Finally, some information that makes sense!

For those using Puffin mobile to access oh2, are you folks making sure you’re getting secure connections, or are you not worrying about it? I’m also curious if one of the folks who seem to be knowledgeable about cybersecurity can answer the question if Puffin is a safe alternative to access oh2 (I.e., better able to reliably provide a secure connection thanks to the way the browser works) or just another workaround. Originally Posted by TinMan
Puffin sends all of your traffic thru their cloud system and it’s rendered there before being sent to your browser. The Puffin cloud system collects your weblogs, including your TCP layer information (Source IP, Source port, destination IP, destination port). It also stores HTTP layer information (URL, HTTP headers).
TinMan's Avatar
Puffin sends all of your traffic thru their cloud system and it’s rendered there before being sent to your browser. The Puffin cloud system collects your weblogs, including your TCP layer information (Source IP, Source port, destination IP, destination port). It also stores HTTP layer information (URL, HTTP headers). Originally Posted by Ralph Fults
I’m no techie, but that doesn’t sound like something I’d want to consent to. Google and Apple may do the same, but those are devils I know.
Jesus How many freaking sites can be created. Thats crazy



I'm posting this here because it is just not ladies that get these texts/emails etc

It didnt take this fool long to jump on the bandwagon of a fallen site..

Got a text from 214-736-4663 asking me what my location is, so i give the general location..

I then get a text from them

hi phemie, oh2 down again? Try us instead https://ourhome4.net . Existing members of P411/ecie/oh2 get automatic activation. Thanks!

Beware of what you click... Originally Posted by Euphemia
TinMan's Avatar
Jesus How many freaking sites can be created. Thats crazy Originally Posted by cage196
Lol, no kidding. Remember when Eccie went dark after Fosta and someone created a mirror site? Folks clamored to that, entering their login credentials from here, without even giving a second thought to the site’s legitimacy (it wasn’t).