indianpunchline.com's certificate status is moving target. As of yesterday, by disabling NOD32's SSL/TSL protocol filtering I could address the site in Chrome where I could then get around that browser's NET::ERR_CERT_REVOKED by simply typing "thisisunsafe". As of today, with NOD32's SSL/TSL protocol filtering disabled, Chrome lets me visit the site immediately, without the passphrase. Yet Firefox doesn't let me visit the site, and NOD32, with SSL/TSL protocol filtering reenabled, certainly doesn't. Google programmers aren't dunderheads. The site is safe enough for cautious use. Chrome's addressbar shows the connection as "Not secure". Why isn't this sufficient? Since the goal of browsing is information, not the feeling of absolute safety, why can't NOD32 include some grown-up bypasses?
DC