1. Library
  2. Http and the Web
  3. Fundamentals

Updated 10 hours ago

Every time you type a URL, your browser makes a quiet security decision. That single letter difference between http:// and https:// determines whether your passwords, messages, and credit card numbers travel across the Internet as plaintext—visible to anyone watching—or encrypted in a tunnel only you and the website can see.

The S stands for Secure. It's the most consequential letter on the Internet.

HTTP: The Postcard Protocol

HTTP was designed for a world that no longer exists.

When Tim Berners-Lee created the web, it was a system for sharing academic papers. There were no passwords to steal, no credit cards to intercept, no private messages to read. Sending data in plaintext wasn't reckless—it was reasonable. The web was innocent.

Then we put our bank accounts on it. Our medical records. Our private conversations. Our identities.

HTTP didn't change. The world around it did.

When you visit a website using plain HTTP, every piece of information travels across the Internet readable by anyone who handles it. Your Internet service provider sees it. Anyone operating a Wi-Fi router you're connected through sees it. The person two tables away at the coffee shop, running packet capture software while you check your email? They see it too.

HTTP is postcards. You write your password on a postcard, hand it to a stranger, and trust that dozens of people will pass it along without reading it. They will read it. Some of them will copy it down.

HTTPS: The Sealed Envelope

HTTPS wraps HTTP in encryption. Before any data travels, three things happen:

Encryption scrambles your data into gibberish that only the intended recipient can unscramble. Modern encryption would take thousands of years to crack with current computers. When you type your credit card number into an HTTPS site, it transforms into meaningless noise the moment it leaves your device.

Authentication proves you're talking to who you think you're talking to. When you connect to https://yourbank.com, your browser demands cryptographic proof that the server is actually your bank—not someone pretending to be your bank. This proof comes as a certificate, issued by organizations whose entire job is verifying identities.

Integrity detects tampering. HTTPS uses mathematical checksums to verify that data arrives exactly as it was sent. If someone intercepts your connection and tries to change your $10 transfer to $10,000, the math doesn't work out. Your browser rejects the altered data.

Three mechanisms. One secure channel through a hostile Internet.

What Happens Without the S

The threats aren't theoretical.

Eavesdropping is trivial on HTTP. Coffee shop Wi-Fi? Anyone on that network can read your traffic with free software. Corporate network? Your IT department can see every URL, every form submission, every message. The broader Internet? Assume someone's watching.

Man-in-the-middle attacks go further. An attacker positions themselves between you and the website, intercepting traffic in both directions. They don't just read—they modify. They inject ads into pages. They redirect you to fake login screens. They steal your session and become you. On unsecured Wi-Fi, this requires only basic skills and tools you can download in minutes.

Session hijacking exploits how HTTP handles "staying logged in." When you check "remember me," your browser stores a cookie—a token proving you're authenticated. Over HTTP, that cookie travels in plaintext. Steal the cookie, become the user. No password needed.

Silent modification is perhaps the most insidious. ISPs have been caught injecting advertisements into HTTP pages. Governments have used HTTP's lack of integrity to censor content or track citizens. Malicious actors have injected cryptocurrency miners, malware, and surveillance code into legitimate websites. HTTP provides no way to verify that what you receive is what was sent.

The Consensus

The Internet has made its decision: HTTPS is no longer optional.

Chrome marks HTTP sites as "Not Secure." Browsers are systematically removing features from HTTP—geolocation, camera access, service workers now require HTTPS. Search engines rank secure sites higher.

Let's Encrypt, launched in 2016, made certificates free and automatic. The cost barrier is gone. The technical barrier is gone. HTTP remains only as legacy and negligence.

HTTPS doesn't slow things down—modern encryption adds milliseconds, and HTTPS is required for HTTP/2 and HTTP/3, protocols that make the web faster than HTTP ever was.

The question isn't whether to use HTTPS. The question is why anything still doesn't.

Key Takeaways

  • HTTP transmits everything in plaintext—passwords, credit cards, messages—visible to anyone on the network path
  • HTTPS encrypts data, authenticates the server's identity, and detects any tampering in transit
  • Without HTTPS, attackers can eavesdrop, hijack sessions, modify content, and impersonate websites
  • Free certificates from Let's Encrypt eliminated the last barrier to universal HTTPS adoption
  • Modern browsers treat HTTP as deprecated and insecure—the S isn't optional anymore

Frequently Asked Questions About HTTP vs. HTTPS

Was this page helpful?

😔
🤨
😃