This repository was archived by the owner on Mar 22, 2018. It is now read-only.

Description
The page itself is displayed through HTTPS but it seems the actual video content is loaded through plain HTTP. Therefore an attacker can observe and/or manipulate the delivered video stream quite easily. This also means that the privacy expectations when watching the videos through the HTTPS site are reduced to zero.
Is this because not every member of the CDN supports HTTPS? Or is this just a programming mistake? In the former case, couldn't you make another DNS pool which only contains servers capable of HTTPS and link to that in case the media site is requested via HTTPS? Because at least some of the CDN server seem to be able to deliver HTTPS just fine.