report / Jan 19, 2017 The 2016 TLS Telemetry Report by David Holmes SHARE download 1Asset 1 In just four short years, a healthy dose of paranoia about individual privacy as well as emerging support for encryption by browsers, social media sites, webmail, and SaaS applications have pushed encryption estimates from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. That’s quite a victory for data privacy, but just how much of a victory? F5 Labs explores that question in the first of our annual TLS Telemetry reports. Our goal is not just to report raw data, but to make that data actionable by describing the who, what, when, how, and why of cryptography, and provide guidance on what’s next for your organization. This being our initial report, we’ve taken care to explain our motivations—crazy though they may seem—for scanning the entire TLS Internet, describe our research methodology, and recap the recent history of and summarize the current cryptographic landscape. Specifically, we look at: Usage and preferences for current (and aging) cryptographic protocols such as TLS and SSL The implications of self-signed certificates Trends that are driving the adoption of Forward Secrecy Reasons why HTTP Strict Transport Security adoption is sluggish The truth about block and stream ciphers The relative security of today’s most popular web servers Finally, we conclude with recommendations for improving your organization’s overall cryptographic posture. To see the full version of this report, click "Download" below. download 1Asset 1 SHARE MODIFIED: Jul 06, 2017 Tags: ssl tls, threat intelligence stay up to date Get the latest application threat intelligence from F5 Labs. There was an error signing up. Thank you, your email address has been signed up. submit Follow us on social media. Related Stories article / Aug 02, 2016 We Expected SSL Everywhere, and It's Well on the Way blog / Aug 01, 2017 RSA in a “Pre-Post-Quantum” Computing World blog / Nov 07, 2017 What Happens to Encryption in a Post-Quantum Computing World?