July/August 2018 issue of acmqueue The July/August issue of acmqueue is out now
Subscribers and ACM Professional members login here

Kode Vicious


  Download PDF version of this article PDF

Error 526 Ray ID: 46ddef849fac9278 • 2018-10-22 18:13:02 UTC

Invalid SSL certificate








What happened?

The origin web server does not have a valid SSL certificate.

What can I do?

If you're a visitor of this website:

Please try again in a few minutes.

If you're the owner of this website:

The SSL certificate presented by the server did not pass validation. This could indicate an expired SSL certificate or a certificate that does not include the requested domain name. Please contact your hosting provider to ensure that an up-to-date and valid SSL certificate issued by a Certificate Authority is configured for this domain name on the origin server. Additional troubleshooting information here.


Originally published in Queue vol. 15, no. 3
see this item in the ACM Digital Library


Follow Kode Vicious on Twitter
and Facebook

Have a question for Kode Vicious? E-mail him at [email protected]. If your question appears in his column, we'll send you a rare piece of authentic Queue memorabilia. We edit e-mails for style, length, and clarity.


Rich Bennett, Craig Callahan, Stacy Jones, Matt Levine, Merrill Miller, Andy Ozment - How to Live in a Post-Meltdown and -Spectre World
Learn from the past to prepare for the next battle.

Arvind Narayanan, Jeremy Clark - Bitcoin's Academic Pedigree
The concept of cryptocurrencies is built from forgotten ideas in research literature.

Geetanjali Sampemane - Internal Access Controls
Trust, but Verify

Thomas Wadlow - Who Must You Trust?
You must have some trust if you want to get anything done.


(newest first)

internet ranger | Sat, 02 Dec 2017 00:08:26 UTC

Why is battery life important on a device that never leaves a single room?

Andrey Polozov | Fri, 14 Jul 2017 21:01:52 UTC

Great point, I believe it's extremely important to promote/encourage/advocate security enforcement on every single device attached to any network. The idea of "there is nothing to protect" gets proven wrong so often - it's better to forget it completely. But I'd disagree that adding security is as cheap as built-in AES support. Adding authentication adds some logistic challenges: How the user will be recognized? How the password/key will be provisioned?, etc. Making those decisions requires different way of thinking than just "let's make it connected". I guess sooner or later we'll have a simple "Security Patterns", that will require clicking/swiping through some simple wizard. Without that I don't think we'll see radical improvement in security of things...

Leave this field empty

Post a Comment:

© 2018 ACM, Inc. All Rights Reserved.