{"id":2304,"date":"2021-02-09T19:05:09","date_gmt":"2021-02-09T19:05:09","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=2304"},"modified":"2021-02-09T19:44:35","modified_gmt":"2021-02-09T19:44:35","slug":"putting-ssl-certificate-pinning-into-laymans-terms","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/","title":{"rendered":"Putting SSL Certificate Pinning Into Layman\u2019s Terms"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">If you\u2019re wondering \u201cIs it safe for me to implement SSL certificate pinning on my website?\u201d then this article is a must-read for you!<\/h2>\n\n\n\n<p>As a website owner or webmaster, you always want to make sure your website is secure. You are ready to implement every possible technique to keep bad guys at bay. One of the security concepts you might have come across is SSL certificate pinning, and now you\u2019re here to learn more about it.<\/p>\n\n\n\n<p>In this article, we\u2019ll cover SSL certificate pinning in an easy-to-understand way. We\u2019ll also cover the benefits and flaws of this process so that you can decide whether SSL pinning is right for your website. (Spoiler alert: SSL certificate pinning isn\u2019t a recommended practice and may result in more harm than good.)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is SSL Certificate Pinning? A Definition<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/bigstock-223372087-1024x640.jpg\" alt=\"Graphic representing a variety of PKI certificate types and, in this case, SSL certificate pinning\" class=\"wp-image-817\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/bigstock-223372087-1024x640.jpg 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/bigstock-223372087-300x188.jpg 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/bigstock-223372087-560x350.jpg 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/bigstock-223372087-1536x960.jpg 1536w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/bigstock-223372087-940x588.jpg 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/bigstock-223372087-480x300.jpg 480w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/bigstock-223372087.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>SSL certificate pinning is a process that aims to limit risk by associating a site\u2019s identity with specific certificates. Basically, it tells a client (browser) to accept connections from ONLY with hosts (websites, apps) whose SSL certificate meets specific criteria and reject the rest. For example, it must use a specific public key or be issued by a specific certificate authority.<\/p>\n\n\n\n<p>The goal of SSL pinning is to avoid <a href=\"https:\/\/www.thesslstore.com\/blog\/social-engineering-attacks-a-look-at-social-engineering-examples-in-action\/\">social engineering-related attacks<\/a> and prevent customers&#8217; data from being sent to the wrong server. However, not everything about it is perfect, which is why <strong>SSL pinning is no longer a recommended practice<\/strong>. But we\u2019ll speak more to that a little later.<\/p>\n\n\n\n<p>In SSL pinning, you instruct the browsers to trust your website only if it:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Uses an SSL\/TLS certificate that\u2019s issued by a particular <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-certificate-authority-certification-authorities-explained\/\">certificate authority<\/a> (CA).<\/li><li>Has a specific cryptographic public key, commonly known as HTTP public key pinning&nbsp;(HPKP).<\/li><li>Has a particular intermediate certificate.<\/li><\/ul>\n\n\n\n<p>That means you are pinning the website\u2019s identity with a predefined cryptographic attribute. <strong>When web browsers see a pinned certificate, they\u2019ll consider any other identity (CA or public key) invalid and deny the connection.<\/strong> The idea here is that if a hacker tries to manipulate an HTTPS connection or SSL certificate, your browser will recognize it and block the website access.<\/p>\n\n\n\n<p>Certificate pinning has been used for everything from internet connections and software to apps and IoT devices. But to truly understand certificate pinning, you need to have a basic understanding of how the SSL\/TLS works and attaches a unique cryptographical identity to a website. Please check out <a href=\"https:\/\/www.thesslstore.com\/blog\/how-does-https-work\/\">article on how HTTPS works<\/a> if you need to brush up on some basic concepts before moving forward.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to Use SSL Certificate Pinning<\/h3>\n\n\n\n<p>As a website owner or webmaster, you can implement SSL pinning by integrating <a href=\"https:\/\/square.github.io\/okhttp\/3.x\/okhttp\/okhttp3\/CertificatePinner.html\">codes in the header<\/a>. You also need to specify the &#8220;max-age&#8221;, which means the amount of time that browsers should consider a particular cryptographical identity valid. (The max-age is typically specified in seconds but may total anywhere from a few second to even a year.)<\/p>\n\n\n\n<p>When the browser connects to your server for the first time, it will save the pinned public key (or its hash value), or the CA you have specified in its records. Now, every time the browser connects to that website, it will trust only predefined attributes from its records up until the specified max-age. If the criterion is mismatched, site visitors will get an error page that\u2019s almost impossible to bypass.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is SSL Certificate Pinning Necessary<\/h2>\n\n\n\n<p>Although certificate pinning isn\u2019t now something that browsers or CAs recommend, it used to be considered a good idea. But why? Because there are three main threats related to SSL\/TLS certificates that SSL pinning tries to address.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Certificate Authority Compromise<\/h3>\n\n\n\n<p>Any certificate authority can issue an SSL certificate&nbsp;for&nbsp;any domain name. Once the certificate has been issued, all the relying parties \u2014 the server and all the major browsers \u2014 would trust it.&nbsp;<\/p>\n\n\n\n<p>But what if the CA&#8217;s server gets hacked or their private keys get compromised? Note: This is a rare issue. But if it does happen, attackers can issue an SSL certificate for any domain name, attaching their own server\u2019s <a href=\"https:\/\/sectigostore.com\/blog\/public-key-vs-private-key-how-do-they-work\/\">public key and private key<\/a>. They can send, receive, decrypt, and steal the data impersonating the original website.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/support.google.com\/mail\/forum\/AAAAK7un8RU3J3r2JqFNTw\/?hl=en&amp;gpf=d\/category-topic\/gmail\/share-and-discuss-with-others\/3J3r2JqFNTw\" target=\"_blank\" rel=\"noreferrer noopener\">In&nbsp;August 2011<\/a>, an <a href=\"https:\/\/slate.com\/technology\/2016\/12\/how-the-2011-hack-of-diginotar-changed-the-internets-infrastructure.html\">unknown attacker hacked&nbsp;Dutch certificate authority&nbsp;DigiNotar<\/a>&nbsp;and&nbsp;issued a&nbsp;fraudulent certificate&nbsp;for google.com and its subdomains.&nbsp;<\/p>\n\n\n\n<p>If such things happen again \u2014 and if you have pinned your certificate authority or the public key \u2014 then the browser won\u2019t trust any certificate that:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Is issued by another CA, or<\/li><li>Contains a different public key.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2. Certificate Mis-Issuance<\/h3>\n\n\n\n<p>If cybercriminals disguise themselves as legit domain owners and convince a CA to tie the wrong public-private key set in a domain name&#8217;s SSL certificate, then all the customers&#8217; data will be transferred to the hacker\u2019s server. In a same way, certificate mis-issuance might take place due to a bug in the CA\u2019s system or by an employee mistake.<\/p>\n\n\n\n<p>For example, <a href=\"https:\/\/security.googleblog.com\/2015\/09\/improved-digital-certificate-security.html\">Symantec issued a faulty SSL\/TLS certificate<\/a> for google.com and <a href=\"http:\/\/www.google.com\">www.google.com<\/a> in 2015. It was an extended validated (EV) certificate, which is considered to be one of the most trustworthy certificate types. Google detected the mis- issuance via its <a href=\"https:\/\/certificate.transparency.dev\/\">certificate transparency mechanism<\/a>. Symantec\u2019s intension was not to defraud Google and the mis-issuance was a mistake that happened during Symantec\u2019s internal testing process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. SSL Stripping<\/h3>\n\n\n\n<p>SSL stripping is a <a href=\"https:\/\/www.thesslstore.com\/blog\/protecting-against-man-in-the-middle-attacks\/\">man-in-the-middle attack<\/a> technique that leaves your data vulnerable to interception and manipulation. In this attack, an attacker sits between a user and the website and uses an SSL strip tool to force the browser to load the website via the insecure HTTP protocol. That means, whenever the browser tries to connect to a website, the attacker downgrades the connection to establish an insecure HTTP connection between the browser and themselves.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The connection between the website visitor and the hacker is HTTP, but the hacker and website&#8217;s server connection is HTTPS. So, what this means is that the attacker can steal all the user\u2019s data because it remains in plaintext format in the HTTP channel. But the server doesn\u2019t realize what\u2019s happening because it\u2019s showing an HTTPS connection on its end.&nbsp;<\/p>\n\n\n\n<p>In SSL stripping, if the certificate\/public key is not pinned, the browser just displays a &#8220;not secure&#8221; sign in front of the domain name in the address bar or shows an error page, which users can easily bypass. But if the SSL is pinned, the browser gets alerted if it can\u2019t find the pinned SSL attributes in the website\u2019s header. If browsers can\u2019t establish a secure HTTPS connection with the predefined attributes, it will show an error page that website visitors can&#8217;t bypass.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Disadvantages of SSL Certificate Pinning<\/h2>\n\n\n\n<p>SSL pinning sounds so cool on the surface, right? But just like other technologies and processes, it isn\u2019t perfect and has some serious downsides when not properly implemented. Here are just a handful of reasons why <a href=\"https:\/\/sectigo.com\/resource-library\/root-causes-113-what-is-certificate-pinning\">SSL certificate pinning is no longer a recommended<\/a> practice. Google and Firefox both have also moved away from public key pinning back in 2018.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Lack of Flexibility in the Event of Private Key Compromise<\/h3>\n\n\n\n<p>If you have pinned a public key in your SSL header, all the browsers and apps have recorded that key in their cache. But what if its corresponding private key gets compromised? If a hacker gets into your hosting site and steals the private key or your employee accidentally leaks it, you must get your SSL certificate revoked and install a new one immediately. That means, you\u2019ll receive a new set of public and private keys.<\/p>\n\n\n\n<p>But the browsers have already recorded the old key and won\u2019t trust the replacement public key until the \u201cmax-age\u201d expires. So, when the browser finds a new public key in the header, it would consider it a cyber attack and won\u2019t let your website visitors open your website.<\/p>\n\n\n\n<p>(<em>However, to reduce the risk, the website owner can install more than one backup SSL certificate on their server and pin several public keys. So, if one certificate is revoked, the backup SSL certificate automatically takes its place, whose public key is already included and pinned in the header.<\/em>)<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Changes in the Certificate<\/h3>\n\n\n\n<p>The Certificate Authority\/Browser Forum (<a href=\"https:\/\/cabforum.org\/baseline-requirements\/\">CA\/B Forum<\/a>) keeps changing the technical specifications and guidelines for the SSL\/TLS certificates and all publicly trusted CAs must adhere to them. That means if CAs have any of the following concerns, then browsers would distrust their SSL\/TLS certificates:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Have issued a certificate with obsolete technology,<\/li><li>Have a bug in their system<\/li><li>Are found guilty of any rule violation, or<\/li><li>Their private key (intermediate certificate\u2019s private key) gets compromised.&nbsp;<\/li><\/ul>\n\n\n\n<p>In such an event, the CA must revoke the distrusted\/obsolete certificates and issue new certificates for their customers. In the past, certificate authorities like <a href=\"https:\/\/security.googleblog.com\/2017\/09\/chromes-plan-to-distrust-symantec.html\">Symantec, RapidSSL, GeoTrust, Thawte<\/a>, and <a href=\"https:\/\/www.thesslstore.com\/blog\/lets-encrypt-to-revoke-3-million-ssl-certificates-on-march-4\/\">Let\u2019s Encrypt<\/a> have faced such revocation issues. If your certificate gets revoked, you\u2019ll be handed a new set of public\/private keys with a replacement certificate. But the browsers won\u2019t recognize the new key and will block the connections.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. If You Pin the Wrong Key, It Can Cause a Lot of Lasting Damage<\/h3>\n\n\n\n<p>Breaking into a weakly protected hosting account isn\u2019t that difficult. If your credentials are compromised, or if attackers deploy <a href=\"https:\/\/aboutssl.org\/what-is-brute-force-attack-how-to-prevent-it\/\">brute-force attacks<\/a>, they can hack your hosting account and the server where the website is hosted. So, if you haven\u2019t pinned any certificate, or if the max-age has passed and you haven&#8217;t re-pinned anything, an attacker can pin their public key to your website&#8217;s headers. This results in diverting all of your website traffic to the attacker&#8217;s servers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion on SSL Certificate Pinning<\/h2>\n\n\n\n<p>SSL pinning surely provides some benefits. But it\u2019s not something that\u2019s recommended and site owners who choose to do it do so at their own risk. The configuration is complicated and there is a lack of flexibility even if you have a legit reason to change the pinned criteria. Basically, if<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Your private key is compromised,<\/li><li>You want to change the CA or the certificate,<\/li><li>The certificate gets revoked for any reason, or<\/li><li>Attackers have pinned the wrong keys<\/li><\/ul>\n\n\n\n<p>there isn\u2019t any easy way to tell the browsers and apps that \u201cHey, from now onwards, trust X keys\/CA\/certificate instead of Y\u201d!<\/p>\n\n\n\n<p>It can be quite costly for a public-facing website to lose the hard-earned web traffic. Implementing SSL certificate pinning on an intranet website can be a much wiser decision instead of on public-facing websites.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re wondering \u201cIs it safe for me to implement SSL certificate pinning on my website?\u201d then this article is a must-read for you! As a website owner or webmaster,&#8230;<\/p>\n","protected":false},"author":6,"featured_media":2305,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","tve_updated_post":"","tve_custom_css":"","tve_user_custom_css":"","tve_globals":{},"tcb2_ready":0,"tcb_editor_enabled":0,"tve_landing_page":"","_tve_header":"","_tve_footer":""},"categories":[13],"tags":[184],"class_list":["post-2304","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-ssl-certificate-pinning","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Putting SSL Certificate Pinning Into Layman\u2019s Terms - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"Historically, SSL certificate pinning served great purposes. Here&#039;s what to know about what SSL pinning is &amp; why it&#039;s no longer recommended.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Putting SSL Certificate Pinning Into Layman\u2019s Terms - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"Historically, SSL certificate pinning served great purposes. Here&#039;s what to know about what SSL pinning is &amp; why it&#039;s no longer recommended.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-09T19:05:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-09T19:44:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/02\/ssl-certificate-pinning-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Medha Mehta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Medha Mehta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/putting-ssl-certificate-pinning-into-laymans-terms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/putting-ssl-certificate-pinning-into-laymans-terms\\\/\"},\"author\":{\"name\":\"Medha Mehta\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"headline\":\"Putting SSL Certificate Pinning Into Layman\u2019s Terms\",\"datePublished\":\"2021-02-09T19:05:09+00:00\",\"dateModified\":\"2021-02-09T19:44:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/putting-ssl-certificate-pinning-into-laymans-terms\\\/\"},\"wordCount\":1794,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/putting-ssl-certificate-pinning-into-laymans-terms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ssl-certificate-pinning-feature.jpg\",\"keywords\":[\"SSL certificate pinning\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/putting-ssl-certificate-pinning-into-laymans-terms\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/putting-ssl-certificate-pinning-into-laymans-terms\\\/\",\"name\":\"Putting SSL Certificate Pinning Into Layman\u2019s Terms - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/putting-ssl-certificate-pinning-into-laymans-terms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/putting-ssl-certificate-pinning-into-laymans-terms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ssl-certificate-pinning-feature.jpg\",\"datePublished\":\"2021-02-09T19:05:09+00:00\",\"dateModified\":\"2021-02-09T19:44:35+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"description\":\"Historically, SSL certificate pinning served great purposes. Here's what to know about what SSL pinning is & why it's no longer recommended.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/putting-ssl-certificate-pinning-into-laymans-terms\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/putting-ssl-certificate-pinning-into-laymans-terms\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/putting-ssl-certificate-pinning-into-laymans-terms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ssl-certificate-pinning-feature.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ssl-certificate-pinning-feature.jpg\",\"width\":1600,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/putting-ssl-certificate-pinning-into-laymans-terms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Putting SSL Certificate Pinning Into Layman\u2019s Terms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\",\"name\":\"Medha Mehta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"caption\":\"Medha Mehta\"},\"description\":\"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.\",\"sameAs\":[\"https:\\\/\\\/sectigostore.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Putting SSL Certificate Pinning Into Layman\u2019s Terms - InfoSec Insights","description":"Historically, SSL certificate pinning served great purposes. Here's what to know about what SSL pinning is & why it's no longer recommended.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/","og_locale":"en_US","og_type":"article","og_title":"Putting SSL Certificate Pinning Into Layman\u2019s Terms - InfoSec Insights","og_description":"Historically, SSL certificate pinning served great purposes. Here's what to know about what SSL pinning is & why it's no longer recommended.","og_url":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/","og_site_name":"InfoSec Insights","article_published_time":"2021-02-09T19:05:09+00:00","article_modified_time":"2021-02-09T19:44:35+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/02\/ssl-certificate-pinning-feature.jpg","type":"image\/jpeg"}],"author":"Medha Mehta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Medha Mehta","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/"},"author":{"name":"Medha Mehta","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"headline":"Putting SSL Certificate Pinning Into Layman\u2019s Terms","datePublished":"2021-02-09T19:05:09+00:00","dateModified":"2021-02-09T19:44:35+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/"},"wordCount":1794,"image":{"@id":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/02\/ssl-certificate-pinning-feature.jpg","keywords":["SSL certificate pinning"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/","url":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/","name":"Putting SSL Certificate Pinning Into Layman\u2019s Terms - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/02\/ssl-certificate-pinning-feature.jpg","datePublished":"2021-02-09T19:05:09+00:00","dateModified":"2021-02-09T19:44:35+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"description":"Historically, SSL certificate pinning served great purposes. Here's what to know about what SSL pinning is & why it's no longer recommended.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/02\/ssl-certificate-pinning-feature.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/02\/ssl-certificate-pinning-feature.jpg","width":1600,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/putting-ssl-certificate-pinning-into-laymans-terms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Putting SSL Certificate Pinning Into Layman\u2019s Terms"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15","name":"Medha Mehta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","caption":"Medha Mehta"},"description":"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.","sameAs":["https:\/\/sectigostore.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=2304"}],"version-history":[{"count":0,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2304\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/2305"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=2304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=2304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=2304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}