May/June 2019 issue of acmqueue The May/June 2019 issue of acmqueue is out now

Subscribers and ACM Professional members login here


  Download PDF version of this article PDF

Error 526 Ray ID: 4fb3ec3e2db7217e • 2019-07-24 06:43:57 UTC

Invalid SSL certificate








What happened?

The origin web server does not have a valid SSL certificate.

What can I do?

If you're a visitor of this website:

Please try again in a few minutes.

If you're the owner of this website:

The SSL certificate presented by the server did not pass validation. This could indicate an expired SSL certificate or a certificate that does not include the requested domain name. Please contact your hosting provider to ensure that an up-to-date and valid SSL certificate issued by a Certificate Authority is configured for this domain name on the origin server. Additional troubleshooting information here.


Originally published in Queue vol. 15, no. 4
see this item in the ACM Digital Library



Simson Garfinkel, John M. Abowd, Christian Martindale - Understanding Database Reconstruction Attacks on Public Data
These attacks on statistical databases are no longer a theoretical danger.

Rich Bennett, Craig Callahan, Stacy Jones, Matt Levine, Merrill Miller, Andy Ozment - How to Live in a Post-Meltdown and -Spectre World
Learn from the past to prepare for the next battle.

Geetanjali Sampemane - Internal Access Controls
Trust, but Verify

Thomas Wadlow - Who Must You Trust?
You must have some trust if you want to get anything done.


(newest first)

Marcus | Mon, 24 Sep 2018 13:20:59 UTC

Love your article!

"Miners are constantly in a race with each other to find the next puzzle solution;"

Totally true! We see in our data on that large mining companies - such as Bitmain - tend to control the network and in the end the price of crypto by manipulating ASIC prices.

We are currently in the process of evaluating this much deeper. If you are interested in any research collaboration on this topic, let me know!

Horacio Mijail Anton Quiles | Wed, 12 Sep 2018 15:23:05 UTC

This kind of perspective is sorely missing in Computer Sciences. Great, great read.

Marcelo | Fri, 27 Oct 2017 14:38:10 UTC

GREAT piece! Do you allow me to translate it to portughese and publish?

Thank you

Monique B | Wed, 06 Sep 2017 07:49:20 UTC

Great work. I really enjoyed reading this.

Dan | Thu, 31 Aug 2017 21:15:35 UTC

Great work

Xavi | Thu, 31 Aug 2017 10:20:38 UTC

Arvind, Jeremy, Thanks for the post. I'm interested in the impact that has for governments and institutions as from my understanding you can easily secure transactions but not being able to identify where the operation had taken place or which are the parties (identified as legal entities). I wonder if there's any bibliography that you can recommend that address this challenges.

Best regards

Roger Ver | Thu, 31 Aug 2017 08:13:15 UTC

Thank you for this read!

Leave this field empty

Post a Comment:

© 2019 ACM, Inc. All Rights Reserved.