Encryption

The 2016 TLS Telemetry Report

In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of a victory is this?
January 19, 2017
34 min. read

In just four short years, a healthy dose of paranoia about individual privacy as well as emerging support for encryption by browsers, social media sites, webmail, and SaaS applications have pushed encryption estimates from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016.

That’s quite a victory for data privacy, but just how much of a victory?

F5 Labs explores that question in the first of our annual TLS Telemetry reports. Our goal is not just to report raw data, but to make that data actionable by describing the who, what, when, how, and why of cryptography, and provide guidance on what’s next for your organization. This being our initial report, we’ve taken care to explain our motivations—crazy though they may seem—for scanning the entire TLS Internet, describe our research methodology, and recap the recent history of and summarize the current cryptographic landscape.

 

 

Specifically, we look at:

  • Usage and preferences for current (and aging) cryptographic protocols such as TLS and SSL
  • The implications of self-signed certificates
  • Trends that are driving the adoption of Forward Secrecy
  • Reasons why HTTP Strict Transport Security adoption is sluggish
  • The truth about block and stream ciphers
  • The relative security of today’s most popular web servers

Finally, we conclude with recommendations for improving your organization’s overall cryptographic posture.

To see the full version of this report, click "Download" below.

Join the Discussion
Authors & Contributors
David Holmes (Author)
Sr. Threat Research Evangelist

What's trending?

Forward and Reverse Shells
Forward and Reverse Shells
09/15/2023 article 5 min. read
Web Shells: Understanding Attackers’ Tools and Techniques
Web Shells: Understanding Attackers’ Tools and Techniques
07/06/2023 article 6 min. read
What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
07/05/2022 article 13 min. read