Skip to the content.

Chapter 2 - Trusted Website concept

Overview

This chapter surveys prevailing website authentication practices, explains their limits, and introduces the Trusted Website paradigm that shifts the default from after the fact blocking to proactive, browser native verification.


HTTPS and SSL/TLS - the foundation

HTTPS (SSL/TLS) is the baseline for secure web traffic. Certificates issued by Certificate Authorities (CAs) bind a domain to keys, enable encryption, and let browsers warn about misconfiguration. These protections are essential but limited:


Certificate Authorities - role and limits

CAs underpin the current trust model but present structural risks:


Application security standards and post‑deployment checks

Standards and frameworks (for example, OWASP ASVS) provide robust post‑deployment checks and development best practice. They reduce exploitable defects but do not prevent malicious or harmful sites from being published in the first place. ASVS style controls are complementary to, but distinct from, gatekeeping verification.


Blocklists and community trust tools

Community and industry blocklists aggregate reports of harmful or fraudulent sites. Their characteristics:


Why these approaches leave users exposed


The Trusted Websites concept

Trusted Websites re‑frames access: only pre‑verified, continuously monitored sites are accessible by default. Key attributes:


Comparative snapshot


Precedents and analogies


Summary

Current standards secure transport and assist detection but do not deliver universal, pre‑emptive assurance. The Trusted Websites paradigm builds on existing identity and credentialing work to make verification a proactive, browser enforced requirement, improving protection while introducing new governance, inclusion and technical design questions that later chapters address.


📖 Continue Reading

➡️ Next: Chapter 3 - Architecture and Governance
⬅️ Back: Chapter 1 - Introduction
🏛️ Back to Index


Last updated: 03-11-2025