#[1]Meta Stack Exchange [2]Feed for question 'TLS 1.0 and TLS 1.1
removal for Stack Exchange services'
Stack Exchange Network
Stack Exchange network consists of 175 Q&A communities including
[3]Stack Overflow, the largest, most trusted online community for
developers to learn, share their knowledge, and build their careers.
[4]Visit Stack Exchange (BUTTON)
____________________
Loading…
1.
2. [5]0
3. [6]+0
4.
+ [7]Tour Start here for a quick overview of the site
+ [8]Help Center Detailed answers to any questions you might
have
+ [9]What's Meta? How Meta is different from other sites
+ [10]About Us Learn more about Stack Overflow the company
+ [11]Business Learn more about hiring developers or posting ads
with us
5.
6. [12]Log in [13]Sign up
7.
[14]current community
+ Stack Exchange
+ Meta Stack Exchange
[15]help [16]chat
your communities
[17]Sign up or [18]log in to customize your list.
[19]more stack exchange communities
[20]company blog
By using our site, you acknowledge that you have read and understand
our [21]Cookie Policy, [22]Privacy Policy, and our [23]Terms of
Service.
Meta Stack Exchange is a question and answer site for meta-discussion
of the Stack Exchange family of Q&A websites. It only takes a minute to
sign up.
[24]Sign up to join this community
[anonymousHeroQuestions.svg?v=748bfb046b78]
Anybody can ask a question
[anonymousHeroAnswers.svg?v=d5348b00eddc]
Anybody can answer
[anonymousHeroUpvote.svg?v=af2bb70d5d1b]
The best answers are voted up and rise to the top
(BUTTON)
[25]Meta Stack Exchange
1. [26]Home
2.
1. [27]Questions
2. [28]Tags
3. [29]Users
4. [30]Unanswered
[31]TLS 1.0 and TLS 1.1 removal for Stack Exchange services
[32]Ask Question
Asked yesterday
Active [33]today
Viewed 5k times
(BUTTON)
201
(BUTTON) (BUTTON)
9
As part of our regular efforts to increase security and keep up with
the times, we will be disabling [34]TLS 1.0 and 1.1 for Stack Exchange
services on February 12th, 2020. TLS 1.2 and above will continue to
work. Note: this will not immediately affect all services. Some of our
services are handled via Fastly, and some at our load balancers
directly - this change will not affect both segments at once. Things
like Q&A, Talent, etc. flow through Fastly and will be the first
affected. Things that are direct, like Chat and our API, will not be
affected immediately.
Why?
Most browsers and operating systems moved to TLS 1.2 quite a while ago
now (for example, we don't support Windows XP...and neither does
Microsoft). We held out for as many clients as possible to move over,
but now it's time to make the change. If you're curious what the
vulnerabilities are in TLS 1.0 and 1.1, [35]there's a good writeup
here. We've been monitoring traffic levels over the past few months and
we are now at HTTPS stats of:
* TLS 1.0: 0.6%
* TLS 1.1: 0.0%
* TLS 1.2: 99.4%
Additionally, it looks like the vast majority of the TLS 1.0 traffic is
bots (and/or sends no user agent at all) - our estimate is that 'not a
robot' requests account for less than a third of that 0.6%.
As an example of the industry moving on here, [36]our current SSL Labs
rating is a B. This is purely because of remaining TLS < 1.2 support
that we plan to remove here.
If anyone has questions, please feel free to comment or answer below
and we'll try and keep up.
[37]discussion [38]featured [39]ssl [40]announcements
[41]share|[42]improve this question
[43]edited yesterday
Nick Craver
asked yesterday
[44]Nick Craver♦Nick Craver
118k2323 gold badges401401 silver badges541541 bronze badges
* 48
Thanks for informing the community in advance for a change ;-)
– [45]cs95 is disappointed with SE yesterday
* 2
Will (or do) you have a failover page that will show an "upgrade
your browser" message to any browsers stuck on 1.0 or 1.1?
– [46]Robotnik yesterday
* 25
@Robotnik nope, not in this case. Not because we're lazy, but
because it just wouldn't help. The failure scenario of an ancient
client is they can't connect, so they'd never get be able to see
such a page. This happens earlier in the negotiation, before any
web traffic is exchanged. – [47]Nick Craver♦ yesterday
* @NickCraver, but currently you support both. Why not replace
handling of old tls by sending to a separate fallback?
– [48]Qwertiy 22 hours ago
* 15
@Qwerity Let me flip that around: why do that work and maintain it?
And for how long? Note: we have to explain to people why it’s still
enabled, etc. it’s not a zero cost to leave it on. Given it’s not
affecting actual users as far as we can tell, what’s the benefit?
Any bots or users relying on this ancient path won’t get what
they’re after, so why play around and spend time on a half measure?
We simply have limited time and resources (like most people), so
maintaining old, almost completely unused, and insecure
infrastructure is not a compelling thing to use those resources on.
– [49]Nick Craver♦ 22 hours ago
* 4
Nearly everybody who's paying attention and running a site has
obsoleted or is in the process of removing TLS 1.0 and 1.1
compatibility. If somebody has an old browser that can't handle
that, they're going to be blocked at most sites they visit. Stack
Exchange will be the least of their worries. – [50]Ask About Monica
21 hours ago
* 3
For that poor less than a third of 0.6% of clients I wonder what
site they'll turn to to ask for help on why they can no longer
connect to Stack Exchange. – [51]BACON 18 hours ago
* @Robotnik Most traffic using weak ciphers are bots attempting to
exploit vulnerabilities. If real users are on devices incapable of
using current generation SSL ciphers, they are most likely unable
to upgrade them anway. Maintaining a failover page simply wouldn't
achieve any useful outcomes. – [52]user1751825 14 hours ago
[53]add a comment |
5 Answers 5
[54]active [55]oldest [56]votes
(BUTTON)
74
(BUTTON)
Removing support for outdated security technologies is surely a good
move. But
I see your statistics includes only TLS 1.2, so do you have any plan
for TLS 1.3? It's the new standard in 2018 and is supported by all
major browsers (excl. IE) and a lot of cloud services (Cloudflare, AWS
ELB etc.). I really think that should be added as well.
[57]share|[58]improve this answer
answered yesterday
[59]iBug is disappointed in SEiBug is disappointed in SE
23.2k44 gold badges4343 silver badges9292 bronze badges
* 1
Without knowing the "guts" inside SE, it could be that there are
backend components (and subcomponents between backends and UIs or
the edge) that do not support TLS 1.3 equally. For example, TLS 1.3
is supported in Java 11, but it is not included in earlier
versions, and there's a ton of Java middleware that for one reason
or another are still running in earlier versions (we run Java 7 at
work.) I suspect it will take a few years before TLS 1.3 become the
90.xxx% supported norm. – [60]luis.espinal yesterday
* 2
IIRC they're a .NET shop, so if they're restricted to a .NET
version < 4.6 then TLS 1.3 is not available. – [61]Matt Ellen
yesterday
* 1
I'm aware about dependency restrictions in a large corporation (we
use unencrypted transmission in our laboratory intranet, which is
pretty small per se), but what about the public-facing part?
– [62]iBug is disappointed in SE yesterday
* 58
Good question! Yes, we are looking at TLS 1.3...but don't want to
combine such changes. That will be a later follow-up once we get
1.0 and 1.1 off the radar here :) Since it's a 2-leg negotiation
from you to Fastly to us, we have the ability to enable TLS 1.3 to
users before the backend if needed...but all components of the
stack are 1.3 compatible for the curious :) – [63]Nick Craver♦
yesterday
[64]add a comment |
(BUTTON)
27
(BUTTON)
EDIT: now fixed
When you write "we will be deprecating TLS 1.0 and 1.1", do you mean
that they will no longer work after next week?
It seems so from your next sentence, but this is confusing to me,
because in my experience that is not what "deprecating" means in the
programming world:
Software deprecation
While a deprecated software feature remains in the software, its use
may raise warning messages recommending alternative practices;
deprecated status may also indicate the feature will be removed in
the future. Features are deprecated rather than immediately removed,
to provide backward compatibility, and to give programmers time to
bring affected code into compliance with the new standard.
from [65]
https://en.wikipedia.org/wiki/Deprecation, and, from
[66]
https://en.wiktionary.org/wiki/deprecate (emphasis mine):
2. (transitive, chiefly computing) To declare something obsolescent;
to recommend against a function, technique, command, etc. that
still works but has been replaced.
[67]share|[68]improve this answer
[69]edited yesterday
answered yesterday
[70]Federico PoloniFederico Poloni
2,81111 gold badge1111 silver badges2020 bronze badges
* 5
In this context it means they're being removed, yep - deprecated in
favor of TLS 1.2 which all supported clients support. It turns out
we just found a bug in non-SNI certificate delivery late last night
as well, which means non-SNI clients (huge overlap with TLS < 1.2
support) weren't getting a valid cert, since December 24th. While
we're already working with Fastly to get that cert API fixed, it
also gives us even more confidence: this change will have very
minimal impact. – [71]Nick Craver♦ yesterday
* 35
@NickCraver Then I strongly suggest that you change the wording.
That is not what "deprecating" means. I suggest to use the words
"we will be removing support for TLS 1.0 and 1.1" instead.
– [72]Federico Poloni yesterday
* 16
Fair enough! Done :) – [73]Nick Craver♦ yesterday
* 2
Q&A-style discussions are weird because I'm not sure to +1 this or
not. I mean, it was a good observation such that, typically, it'd
be an easy +1. Except now that it's been fixed, this doesn't really
provide value to readers. But the current system gives rep to
answerers who make positive contributions, and it doesn't seem like
this answerer deserves less rep just because their contribution was
immediately actionable. But then this could've been a comment
instead, which wouldn't have given rep anyway. But then is that
consistent in the first place? – [74]Nat yesterday
* 5
@Nat I think you're overthinking this ;) – [75]maxathousand
yesterday
* 11
@Nat What is weird, in my view, is using a Q&A-style system for an
announcement, and soliciting questions about the announcements to
be posted as answers (presumably, to be answered by the SE staff in
comments). It all feels like using the system backwards. (See also:
dogfooding, inner platform effect.) – [76]Federico Poloni yesterday
* 2
@Federico Poloni - I agree with you. It's a misuse of the Q&A
format and a bad example to the other sites. IMHO it'd be better if
meta had a slightly different format than all other sites.
– [77]LawrenceC 18 hours ago
[78]add a comment |
(BUTTON)
1
(BUTTON)
Running the [79]Immuniweb.com Security Test it complains (abbreviated
version):
[80]Summary of stackexchange.com SSL Security Test
The problem is TLSv1.1 and TLSv1.0 configured with TLS_RSA_WITH_ 3DES
_EDE_CBC_SHA enabled, that is non-compliant with PCI DSS requirements.
In particular, the test complains of supporting TLSv1.0 and lack of
support for TLSv1.3. in addition it says: "The HTTP version of the
website does not redirect to the HTTPS version. We advise to enable
redirection.".
You probably know this but the latest guidelines are: SP 800-52 Rev. 2
"[81]Guidelines for the Selection, Configuration, and Use of Transport
Layer Security (TLS) Implementations".
There is also hardware available, such as [82]Symantec's SSL Visibility
Appliance, which can [83]permit security tools to operate despite
end-to-end encryption; but it's expensive. Despite the expense
[84]traffic inspection is necessary unless you simply want to hope that
nothing can go wrong. There are also [85]Data Loss Prevention
Appliances which can detect theft of personal information, password
files, and other sensitive data; and block it before it goes over the
wire.
Your move to TLS 1.2 and up is a welcome one, we wouldn't want you to
go down for a few days or suffer the annoyance (warning?) of last
year's hack again. Thanks for keeping on the leading edge.
[86]share|[87]improve this answer
answered 6 hours ago
[88]RobRob
9,31533 gold badges2424 silver badges6363 bronze badges
[89]add a comment |
(BUTTON)
-2
(BUTTON)
How many users are impacted, and what measures have you got in place to
measure that impact?
You claim that
our estimate is that 'not a robot' requests account for less than a
third of that 0.6%
but that still seems like a decent number of people. Taking the 10m/day
traffic figure reported for SO on [90]the sites list, that 0.2% is
still something like 20,000 visits a day, which is not insignificant
(i.e. more than half a million visits a month), particularly if it
represents people from the marginalized backgrounds that SO claims to
champion and be welcoming to.
Now, your [91]comment that
quite a few technologies prefer TLS 1.0 and upgrade
is also fair enough. There's a large niche of user agents that won't be
impacted by the change: they're getting TLS 1.0 because they asked for
it, but will happily take higher versions if you don't give them their
first choice. And we can't know how many users this represents until
you disable TLS 1.0.
So... what are your plans for measuring how many people are in this
category, and how many people lose the access they currently have
because of it? Are you going to report that publicly?
[92]share|[93]improve this answer
answered 3 hours ago
[94]E.P.E.P.
12.5k33 gold badges3434 silver badges6060 bronze badges
[95]add a comment |
(BUTTON)
-7
(BUTTON)
This is a pretty bad idea, following a trend that's based on common
misunderstandings of how protocols work, and undermining the value of
robustness and interoperability (also known as Postel's law).
* Browser vendors have announced that they'll be deprecating support
for TLSv1.0 and TLSv1.1 in 2020. It is often cited that TLSv1.0 is
removed in order to avoid downgrade attacks. But if supported
browsers don't support anything below TLSv1.2, then there's nothing
for them to downgrade to, so, there doesn't seem to be a good
reason to remove support on the websites as well.
* This change means that it will no longer be possible to view your
properties from older iPad, iPhone, Android and webOS devices, for
little good reason. Keep in mind, these are devices that have
gigabytes of storage and hundreds of megabytes of memory each,
these are not some outdated devices that don't have the processing
power to do common tasks, these are very powerful devices that
simply have been abandoned by their vendors. This will result in an
effective link rot on a rather large scale (search results from
Google will no longer work), and will widen the digital gap between
people who don't have the resources to buy the latest tablets,
phones and other gadgets. You're effectively doing the brokering
for planned obsolescence on behalf of Apple and other vendors,
contributing to the global warming by deprecating very powerful
devices, each with gigabytes of storage and megabytes of RAM, which
are still perfectly capable of performing complex computing tasks.
* SSL Labs rating is a B. Only a third of 0.6% of visitors require
TLSv1.0. You're basically telling us that you'd rather have a
better rating on a meaningless scale by completely denying access
to your website only for a few million actual, real users. Is this
for real? Is this what our industry has become?
Please consider doing the following instead:
* Bring back full HTTP access. With an HSTS policy in place, none of
the supported browsers will ever notice that HTTP support is even
available. With HSTS (which is already in place on Stack Overflow),
all http:// links are treated as https://, so, there's no effective
difference for any supported browser, but the older devices that
may not have recent https support could still view the site. (For
new visitors, all you have to do is have an invisible pixel to your
HTTPS site from the HTTP one, which will automatically install HSTS
policy, and no further requests will be made over HTTP; this is
trivial to accomplish, and should seamlessly support both legacy
and modern browsers.)
* Do not disable TLSv1.0 (and noone cares for TLSv1.1 either way, as
there's hardly anything that supports TLSv1.1 without also
supporting TLSv1.2). Even if HTTP access is available, browsers
that don't support TLSv1.2 would not be able to follow the existing
https:// links due to lack of TLSv1.2 support, resulting in link
rot. (If there's a worry about certificate compromise with serving
TLSv1.0, it's rather trivial to divert TLSv1.0 and TLSv1.2 traffic
to distinct servers that each have distinct certificates, serving
distinct content, without TLSv1.2-only clients being affected in
any negative way; if TLSv1.0 is somehow deemed to be so insecure as
to being worse than straight HTTP, then it's also an option to
redirect back from HTTPS to HTTP for such old TLSv1.0-only clients
in order to not contribute to link rot.)
[96]share|[97]improve this answer
answered 16 hours ago
[98]cnstcnst
1,06566 silver badges1414 bronze badges
* 12
That traffic is almost all bots, I called this out in the post.
We’ve delayed until user impact is minimal. The number is not
millions, we’d be shocked if it was even in the thousands. You’re
also forgetting that quite a few technologies prefer TLS 1.0 and
upgrade, not downgrade of its missing. This means they default to
an insecure protocol. Some of that 0.6% will be just fine because
it’s in this bucket…even though it’s almost all bots. – [99]Nick
Craver♦ 16 hours ago
* @NickCraver "You’re also forgetting that quite a few technologies
prefer TLS 1.0 and upgrade, not downgrade of its missing." — what
do you mean? FYI: Google still fully supports Google Search over
HTTP, last I checked a couple of weeks ago. I also highly doubt
that there's only a thousand of deprecated iPad devices still in
operation, and/or some of them may already be denied access due to
cipher differences. – [100]cnst 16 hours ago
* 10
Okay let's take that example. TLS 1.2 is supported all the way back
to iOS 5. It's install-able all the way back to the iPhone 3GS and
the original iPad. So quite literally, there's not an iPad that
would not support connecting to us over TLS 1.2. I'm happy to have
good faith arguments on this about what we should support, but this
seems like we're just really reaching to "why don't you support
everything forever"? Remember, all of these devices in the example
are from browsers we a) do not support (and haven't for some time),
and b) render our pages very badly - they're a decade behind.
– [101]Nick Craver♦ 16 hours ago
* 4
On the TLS 1.0 front, some things like older OSes (PowerShell, etc.
included) will try TLS 1.0 only based on config, or in order. They
are capable of TLS 1.2 though. In short: we're not going to
continue supporting these insecure protocols the entire industry
recommends against at this point. It's just a bad practice, and has
near-zero impact to actual users (which I do care greatly about).
– [102]Nick Craver♦ 16 hours ago
* 4
@NickCraver Agreed. Continuing to allow insecure protocols simply
to support some hyperthetical user base on very old devices, I
would say would be irresponsible. – [103]user1751825 14 hours ago
* 3
@cnst, how "older" are you talking about? I've got an Android 4.4
device I keep around for compatibility testing, and the default
browser supports TLS 1.2. – [104]Mark 13 hours ago
* You can even argue that support for SSLv3 should be brought back as
well for "compatibility with Windows XP" or what have you, even
though WinXP has been EOL for nearly 6 years - from when your son
entered a primary school to now graduated. In short, there's really
little reason to keep obsolete setup forever. – [105]iBug is
disappointed in SE 12 hours ago
* @user1751825 that's why I recommend enabling HTTP, because HTTP is
not insecure, like the older versions of TLS/OpenSSL are.
– [106]cnst 12 hours ago
* 3
@cnst HTTP is inherently insecure, because it is not encrypted at
all. It should not be enabled simply to support old insecure
clients. Allowing HTTP on a HTTPS enabled site, weakens the overall
security of the site because it allows protocol downgrade attacks,
and prevents the use of HSTS headers. – [107]user1751825 12 hours
ago
* It's also worth considering SE supports only a subset of browsers
in a subset of OSes.A significant number of the examples you gave
are not or might never be supported. And I doubt the move to http
fallback makes any sense at all. – [108]Journeyman Geek♦ 11 hours
ago
* 1
@user1751825 what you say doesn't make sense, because downgrade
attacks aren't possible if you already have HSTS, even if HTTP is
left undisturbed; and if you don't have HSTS, and are requesting
over HTTP already, then there's nothing to downgrade; just because
there's no encryption doesn't make HTTP insecure, either,
especially if it's all public information being transmitted (most
readers don't have accounts), and it's up to the user and their
provider on whether or not their traffic is modified (nation states
can already permanently block https and proxy https over http,
should they want). – [109]cnst 11 hours ago
* Plaintext HTTP is insecure in two ways - attacker can see what's
transmitted, and can also manipulate what's transmitted. It's
common in China where ISP endpoints insert junk ads into whatever
page viewed through HTTP ([110]ref). – [111]iBug is disappointed in
SE 9 hours ago
* @iBugisdisappointedinSE so, your solution is to self-destruct by
blocking HTTP in case they decide to block HTTPS? If the
nation-state provider controls the communication channel, they can
simply never allow HTTPS in the first place, never letting HSTS to
get installed, and always run a masquerade proxy on http to proxy
https content selectively; in all, plaintext HTTP is just life.
– [112]cnst 7 hours ago
* 2
If a state decided to block HTTPS completely, then it's not SE's
responsibility to maintain its accessibility by allowing plaintext.
HTTP is not life, it's obsolete. – [113]iBug is disappointed in SE
5 hours ago
[114]add a comment |
You must [115]log in to answer this question.
Not the answer you're looking for? Browse other questions tagged
[116]discussion [117]featured [118]ssl [119]announcements .
Welcome!
Welcome! Meta Stack Exchange is intended for bugs, features, and
discussions that affect the whole Stack Exchange family of Q&A sites.
[120]about » [121]help »
Blog
* [122]The 2020 Developer Survey is now open!
Featured on Meta
* [123]TLS 1.0 and TLS 1.1 removal for Stack Exchange services
[124]Visit chat
Related
1022
[125]Are there any clones/alternatives for running a Stack Exchange
style Q&A site?
523
[126]The MIT License – Clarity on Using Code on Stack Overflow and
Stack Exchange
2753
[127]A Terms of Service update restricting companies that scrape your
profile information without your permission
448
[128]Network-wide HTTPS: It's time
198
[129]Brief outage planned for Wed, May 3, 2017 at 8pm US/Eastern (00:00
UTC) (like a fire drill for computers)
820
[130]Net Neutrality and Stack Overflow / Stack Exchange
372
[131]Updating the Hot Network Questions List - now with a bit more
network and a little less “hotness”!
2232
[132]Firing mods and forced relicensing: is Stack Exchange still
interested in cooperating with the community?
665
[133]Dear Stack Exchange: a statement and a letter from your moderators
1853
[134]Stack Overflow is doing me ongoing harm; it's time to fix it!
[135]Hot Network Questions
* [136]Primitive underwater melee combat
* [137]Doubt on how move as black after pawn in e5
* [138]How often should I clean my water bladder/reservoir while on a
thru-hike, extended backpacking trip, or survival scenario?
* [139]Does a non-creature God entering the battlefield trigger Pelt
Collector?
* [140]Are screened transistors an endangered species?
* [141]How to generate a random integer array satisfying complex
constraints
* [142]Would this hit/miss houserule be balanced with bounded
accuracy?
* [143]What will happen if someone/a group can't be confirmed that
they commited a crime?
* [144]Bin packing variant
* [145]How to deal with a promotion if you are not sure you want it?
* [146]Can open-source software be peer-reviewed and published?
* [147]When was the first recorded occurence of irrational and
imaginary number usage in number theory?
* [148]Why does my tea periodically alternate its rotational speed
after stirring? (Link to video below)
* [149]Reviewing custom array List class of java
* [150]What is this large engine doing on a B52?
* [151]How is the term "fabric" defined in networking?
* [152]Why, in old movies and TV series, do they always use such
extremely exaggerated wheel turns when driving a car?
* [153]Existential unforgeability vs strong unforgeability
* [154]My prefix is a memory; my infix, you may hate
* [155]We can ignore the wire resistance if the current delivered by
the wire is low?
* [156]How to avoid comments about one line of code for cleanliness
* [157]Compress 8 bits to 6 when certain bit patterns will never
occur
* [158]What made Jesus question at Mt 21:25 a good example for
Christians or was it a bad question because the Jews could not
answer?
* [159]How to quickly and inexpensively deposit cash?
[160]more hot questions
[161]Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS
reader.
https://meta.stackex
[162]Meta Stack Exchange
* [163]Tour
* [164]Help
* [165]Chat
* [166]Contact
* [167]Feedback
* Mobile
[168]Company
* [169]Stack Overflow
* [170]Stack Overflow Business
* [171]Developer Jobs
* [172]About
* [173]Press
* [174]Legal
* [175]Privacy Policy
[176]Stack Exchange
Network
* [177]Technology
* [178]Life / Arts
* [179]Culture / Recreation
* [180]Science
* [181]Other
* [182]Stack Overflow
* [183]Server Fault
* [184]Super User
* [185]Web Applications
* [186]Ask Ubuntu
* [187]Webmasters
* [188]Game Development
* [189]TeX - LaTeX
* [190]Software Engineering
* [191]Unix & Linux
* [192]Ask Different (Apple)
* [193]WordPress Development
* [194]Geographic Information Systems
* [195]Electrical Engineering
* [196]Android Enthusiasts
* [197]Information Security
* [198]Database Administrators
* [199]Drupal Answers
* [200]SharePoint
* [201]User Experience
* [202]Mathematica
* [203]Salesforce
* [204]ExpressionEngine® Answers
* [205]Stack Overflow em Português
* [206]Blender
* [207]Network Engineering
* [208]Cryptography
* [209]Code Review
* [210]Magento
* [211]Software Recommendations
* [212]Signal Processing
* [213]Emacs
* [214]Raspberry Pi
* [215]Stack Overflow на русском
* [216]Code Golf
* [217]Stack Overflow en español
* [218]Ethereum
* [219]Data Science
* [220]Arduino
* [221]Bitcoin
* [222]Software Quality Assurance & Testing
* [223]Sound Design
* [224]Windows Phone
* [225]more (27)
* [226]Photography
* [227]Science Fiction & Fantasy
* [228]Graphic Design
* [229]Movies & TV
* [230]Music: Practice & Theory
* [231]Worldbuilding
* [232]Video Production
* [233]Seasoned Advice (cooking)
* [234]Home Improvement
* [235]Personal Finance & Money
* [236]Academia
* [237]Law
* [238]Physical Fitness
* [239]Gardening & Landscaping
* [240]Parenting
* [241]more (11)
* [242]English Language & Usage
* [243]Skeptics
* [244]Mi Yodeya (Judaism)
* [245]Travel
* [246]Christianity
* [247]English Language Learners
* [248]Japanese Language
* [249]Chinese Language
* [250]French Language
* [251]German Language
* [252]Biblical Hermeneutics
* [253]History
* [254]Spanish Language
* [255]Islam
* [256]Русский язык
* [257]Russian Language
* [258]Arqade (gaming)
* [259]Bicycles
* [260]Role-playing Games
* [261]Anime & Manga
* [262]Puzzling
* [263]Motor Vehicle Maintenance & Repair
* [264]Board & Card Games
* [265]Bricks
* [266]Homebrewing
* [267]Martial Arts
* [268]The Great Outdoors
* [269]Poker
* [270]Chess
* [271]Sports
* [272]more (16)
* [273]MathOverflow
* [274]Mathematics
* [275]Cross Validated (stats)
* [276]Theoretical Computer Science
* [277]Physics
* [278]Chemistry
* [279]Biology
* [280]Computer Science
* [281]Philosophy
* [282]Linguistics
* [283]Psychology & Neuroscience
* [284]Computational Science
* [285]more (8)
* [286]Meta Stack Exchange
* [287]Stack Apps
* [288]API
* [289]Data
* [290]Blog
* [291]Facebook
* [292]Twitter
* [293]LinkedIn
site design / logo © 2020 Stack Exchange Inc; user contributions
licensed under [294]cc by-sa 4.0 with [295]attribution required.
rev 2020.2.7.36004
Meta Stack Exchange works best with JavaScript enabled
References
Visible links
1.
https://meta.stackexchange.com/opensearch.xml
2.
https://meta.stackexchange.com/feeds/question/343302
3.
https://stackoverflow.com/
4.
https://stackexchange.com/
5.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
6.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
7.
https://meta.stackexchange.com/tour
8.
https://meta.stackexchange.com/help
9.
https://meta.stackexchange.com/help/whats-meta
10.
https://stackoverflow.com/company/about
11.
https://stackoverflowbusiness.com/?ref=topbar_help
12.
https://meta.stackexchange.com/users/login?ssrc=head&returnurl=
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
13.
https://meta.stackexchange.com/users/signup?ssrc=head&returnurl=
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
14.
https://meta.stackexchange.com/
15.
https://meta.stackexchange.com/help
16.
https://chat.meta.stackexchange.com/
17.
https://meta.stackexchange.com/users/signup?ssrc=site_switcher&returnurl=
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
18.
https://meta.stackexchange.com/users/login?ssrc=site_switcher&returnurl=
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
19.
https://stackexchange.com/sites
20.
https://stackoverflow.blog/
21.
https://stackoverflow.com/legal/cookie-policy
22.
https://stackoverflow.com/legal/privacy-policy
23.
https://stackoverflow.com/legal/terms-of-service/public
24.
https://meta.stackexchange.com/users/signup?ssrc=hero&returnurl=
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
25.
https://meta.stackexchange.com/
26.
https://meta.stackexchange.com/
27.
https://meta.stackexchange.com/questions
28.
https://meta.stackexchange.com/tags
29.
https://meta.stackexchange.com/users
30.
https://meta.stackexchange.com/unanswered
31.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
32.
https://meta.stackexchange.com/questions/ask
33.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services?lastactivity
34.
https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/
35.
https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/
36.
https://www.ssllabs.com/ssltest/analyze.html?d=stackoverflow.com&latest
37.
https://meta.stackexchange.com/questions/tagged/discussion
38.
https://meta.stackexchange.com/questions/tagged/featured
39.
https://meta.stackexchange.com/questions/tagged/ssl
40.
https://meta.stackexchange.com/questions/tagged/announcements
41.
https://meta.stackexchange.com/q/343302
42.
https://meta.stackexchange.com/posts/343302/edit
43.
https://meta.stackexchange.com/posts/343302/revisions
44.
https://meta.stackexchange.com/users/135201/nick-craver
45.
https://meta.stackexchange.com/users/494004/cs95-is-disappointed-with-se
46.
https://meta.stackexchange.com/users/179041/robotnik
47.
https://meta.stackexchange.com/users/135201/nick-craver
48.
https://meta.stackexchange.com/users/309650/qwertiy
49.
https://meta.stackexchange.com/users/135201/nick-craver
50.
https://meta.stackexchange.com/users/234991/ask-about-monica
51.
https://meta.stackexchange.com/users/699943/bacon
52.
https://meta.stackexchange.com/users/506413/user1751825
53.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
54.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services?answertab=active#tab-top
55.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services?answertab=oldest#tab-top
56.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services?answertab=votes#tab-top
57.
https://meta.stackexchange.com/a/343321
58.
https://meta.stackexchange.com/posts/343321/edit
59.
https://meta.stackexchange.com/users/350567/ibug-is-disappointed-in-se
60.
https://meta.stackexchange.com/users/144174/luis-espinal
61.
https://meta.stackexchange.com/users/147791/matt-ellen
62.
https://meta.stackexchange.com/users/350567/ibug-is-disappointed-in-se
63.
https://meta.stackexchange.com/users/135201/nick-craver
64.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
65.
https://en.wikipedia.org/wiki/Deprecation
66.
https://en.wiktionary.org/wiki/deprecate
67.
https://meta.stackexchange.com/a/343341
68.
https://meta.stackexchange.com/posts/343341/edit
69.
https://meta.stackexchange.com/posts/343341/revisions
70.
https://meta.stackexchange.com/users/243091/federico-poloni
71.
https://meta.stackexchange.com/users/135201/nick-craver
72.
https://meta.stackexchange.com/users/243091/federico-poloni
73.
https://meta.stackexchange.com/users/135201/nick-craver
74.
https://meta.stackexchange.com/users/351012/nat
75.
https://meta.stackexchange.com/users/385118/maxathousand
76.
https://meta.stackexchange.com/users/243091/federico-poloni
77.
https://meta.stackexchange.com/users/699921/lawrencec
78.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
79.
https://www.immuniweb.com/ssl/?id=mzPwBEFm
80.
https://i.stack.imgur.com/9b7xE.jpg
81.
https://csrc.nist.gov/publications/detail/sp/800-52/rev-2/final
82.
https://www.symantec.com/products/ssl-visibility-appliance
83.
https://www.symantec.com/blogs/product-insights/removing-blind-spots-ssltls
84.
https://www.darkreading.com/endpoint/ready-or-not-transport-layer-security-13-is-coming/a/d-id/1331753?
85.
http://www.edgeblue.com/DLP700.asp
86.
https://meta.stackexchange.com/a/343389
87.
https://meta.stackexchange.com/posts/343389/edit
88.
https://meta.stackexchange.com/users/282094/rob
89.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
90.
https://stackexchange.com/sites#traffic
91.
https://meta.stackexchange.com/q/343302#comment1150023_343368
92.
https://meta.stackexchange.com/a/343400
93.
https://meta.stackexchange.com/posts/343400/edit
94.
https://meta.stackexchange.com/users/184688/e-p
95.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
96.
https://meta.stackexchange.com/a/343368
97.
https://meta.stackexchange.com/posts/343368/edit
98.
https://meta.stackexchange.com/users/221016/cnst
99.
https://meta.stackexchange.com/users/135201/nick-craver
100.
https://meta.stackexchange.com/users/221016/cnst
101.
https://meta.stackexchange.com/users/135201/nick-craver
102.
https://meta.stackexchange.com/users/135201/nick-craver
103.
https://meta.stackexchange.com/users/506413/user1751825
104.
https://meta.stackexchange.com/users/268944/mark
105.
https://meta.stackexchange.com/users/350567/ibug-is-disappointed-in-se
106.
https://meta.stackexchange.com/users/221016/cnst
107.
https://meta.stackexchange.com/users/506413/user1751825
108.
https://meta.stackexchange.com/users/135565/journeyman-geek
109.
https://meta.stackexchange.com/users/221016/cnst
110.
https://thehackernews.com/2016/02/china-hacker-malware.html
111.
https://meta.stackexchange.com/users/350567/ibug-is-disappointed-in-se
112.
https://meta.stackexchange.com/users/221016/cnst
113.
https://meta.stackexchange.com/users/350567/ibug-is-disappointed-in-se
114.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
115.
https://meta.stackexchange.com/users/login?ssrc=question_page&returnurl=
https://meta.stackexchange.com/questions/343302
116.
https://meta.stackexchange.com/questions/tagged/discussion
117.
https://meta.stackexchange.com/questions/tagged/featured
118.
https://meta.stackexchange.com/questions/tagged/ssl
119.
https://meta.stackexchange.com/questions/tagged/announcements
120.
https://meta.stackexchange.com/tour?mnu=1
121.
https://meta.stackexchange.com/help?mnu=1
122.
https://stackoverflow.blog/2020/02/05/the-2020-developer-survey-is-now-open/
123.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
124.
https://chat.meta.stackexchange.com/
125.
https://meta.stackexchange.com/questions/2267/are-there-any-clones-alternatives-for-running-a-stack-exchange-style-qa-site
126.
https://meta.stackexchange.com/questions/271080/the-mit-license-clarity-on-using-code-on-stack-overflow-and-stack-exchange
127.
https://meta.stackexchange.com/questions/277369/a-terms-of-service-update-restricting-companies-that-scrape-your-profile-informa
128.
https://meta.stackexchange.com/questions/292058/network-wide-https-its-time
129.
https://meta.stackexchange.com/questions/295285/brief-outage-planned-for-wed-may-3-2017-at-8pm-us-eastern-0000-utc-like-a
130.
https://meta.stackexchange.com/questions/297816/net-neutrality-and-stack-overflow-stack-exchange
131.
https://meta.stackexchange.com/questions/325060/updating-the-hot-network-questions-list-now-with-a-bit-more-network-and-a-litt
132.
https://meta.stackexchange.com/questions/333965/firing-mods-and-forced-relicensing-is-stack-exchange-still-interested-in-cooper
133.
https://meta.stackexchange.com/questions/334575/dear-stack-exchange-a-statement-and-a-letter-from-your-moderators
134.
https://meta.stackexchange.com/questions/336526/stack-overflow-is-doing-me-ongoing-harm-its-time-to-fix-it
135.
https://stackexchange.com/questions?tab=hot
136.
https://worldbuilding.stackexchange.com/questions/167700/primitive-underwater-melee-combat
137.
https://chess.stackexchange.com/questions/28338/doubt-on-how-move-as-black-after-pawn-in-e5
138.
https://outdoors.stackexchange.com/questions/24754/how-often-should-i-clean-my-water-bladder-reservoir-while-on-a-thru-hike-extend
139.
https://boardgames.stackexchange.com/questions/50230/does-a-non-creature-god-entering-the-battlefield-trigger-pelt-collector
140.
https://electronics.stackexchange.com/questions/479780/are-screened-transistors-an-endangered-species
141.
https://mathematica.stackexchange.com/questions/214230/how-to-generate-a-random-integer-array-satisfying-complex-constraints
142.
https://rpg.stackexchange.com/questions/164294/would-this-hit-miss-houserule-be-balanced-with-bounded-accuracy
143.
https://law.stackexchange.com/questions/48788/what-will-happen-if-someone-a-group-cant-be-confirmed-that-they-commited-a-crim
144.
https://or.stackexchange.com/questions/3502/bin-packing-variant
145.
https://workplace.stackexchange.com/questions/152640/how-to-deal-with-a-promotion-if-you-are-not-sure-you-want-it
146.
https://academia.stackexchange.com/questions/143873/can-open-source-software-be-peer-reviewed-and-published
147.
https://hsm.stackexchange.com/questions/11434/when-was-the-first-recorded-occurence-of-irrational-and-imaginary-number-usage-i
148.
https://physics.stackexchange.com/questions/529076/why-does-my-tea-periodically-alternate-its-rotational-speed-after-stirring-lin
149.
https://codereview.stackexchange.com/questions/236822/reviewing-custom-array-list-class-of-java
150.
https://aviation.stackexchange.com/questions/74192/what-is-this-large-engine-doing-on-a-b52
151.
https://networkengineering.stackexchange.com/questions/64991/how-is-the-term-fabric-defined-in-networking
152.
https://history.stackexchange.com/questions/56562/why-in-old-movies-and-tv-series-do-they-always-use-such-extremely-exaggerated
153.
https://crypto.stackexchange.com/questions/77445/existential-unforgeability-vs-strong-unforgeability
154.
https://puzzling.stackexchange.com/questions/93475/my-prefix-is-a-memory-my-infix-you-may-hate
155.
https://electronics.stackexchange.com/questions/479949/we-can-ignore-the-wire-resistance-if-the-current-delivered-by-the-wire-is-low
156.
https://softwareengineering.stackexchange.com/questions/404737/how-to-avoid-comments-about-one-line-of-code-for-cleanliness
157.
https://codegolf.stackexchange.com/questions/199102/compress-8-bits-to-6-when-certain-bit-patterns-will-never-occur
158.
https://christianity.stackexchange.com/questions/75403/what-made-jesus-question-at-mt-2125-a-good-example-for-christians-or-was-it-a-b
159.
https://money.stackexchange.com/questions/119997/how-to-quickly-and-inexpensively-deposit-cash
160.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
161.
https://meta.stackexchange.com/feeds/question/343302
162.
https://meta.stackexchange.com/
163.
https://meta.stackexchange.com/tour
164.
https://meta.stackexchange.com/help
165.
https://chat.meta.stackexchange.com/
166.
https://meta.stackexchange.com/contact
167.
https://meta.stackexchange.com/
168.
https://stackoverflow.com/company/about
169.
https://stackoverflow.com/
170.
https://stackoverflowbusiness.com/
171.
https://stackoverflow.com/jobs
172.
https://stackoverflow.com/company/about
173.
https://stackoverflow.com/company/press
174.
https://stackoverflow.com/legal
175.
https://stackoverflow.com/legal/privacy-policy
176.
https://stackexchange.com/
177.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
178.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
179.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
180.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
181.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
182.
https://stackoverflow.com/
183.
https://serverfault.com/
184.
https://superuser.com/
185.
https://webapps.stackexchange.com/
186.
https://askubuntu.com/
187.
https://webmasters.stackexchange.com/
188.
https://gamedev.stackexchange.com/
189.
https://tex.stackexchange.com/
190.
https://softwareengineering.stackexchange.com/
191.
https://unix.stackexchange.com/
192.
https://apple.stackexchange.com/
193.
https://wordpress.stackexchange.com/
194.
https://gis.stackexchange.com/
195.
https://electronics.stackexchange.com/
196.
https://android.stackexchange.com/
197.
https://security.stackexchange.com/
198.
https://dba.stackexchange.com/
199.
https://drupal.stackexchange.com/
200.
https://sharepoint.stackexchange.com/
201.
https://ux.stackexchange.com/
202.
https://mathematica.stackexchange.com/
203.
https://salesforce.stackexchange.com/
204.
https://expressionengine.stackexchange.com/
205.
https://pt.stackoverflow.com/
206.
https://blender.stackexchange.com/
207.
https://networkengineering.stackexchange.com/
208.
https://crypto.stackexchange.com/
209.
https://codereview.stackexchange.com/
210.
https://magento.stackexchange.com/
211.
https://softwarerecs.stackexchange.com/
212.
https://dsp.stackexchange.com/
213.
https://emacs.stackexchange.com/
214.
https://raspberrypi.stackexchange.com/
215.
https://ru.stackoverflow.com/
216.
https://codegolf.stackexchange.com/
217.
https://es.stackoverflow.com/
218.
https://ethereum.stackexchange.com/
219.
https://datascience.stackexchange.com/
220.
https://arduino.stackexchange.com/
221.
https://bitcoin.stackexchange.com/
222.
https://sqa.stackexchange.com/
223.
https://sound.stackexchange.com/
224.
https://windowsphone.stackexchange.com/
225.
https://stackexchange.com/sites#technology
226.
https://photo.stackexchange.com/
227.
https://scifi.stackexchange.com/
228.
https://graphicdesign.stackexchange.com/
229.
https://movies.stackexchange.com/
230.
https://music.stackexchange.com/
231.
https://worldbuilding.stackexchange.com/
232.
https://video.stackexchange.com/
233.
https://cooking.stackexchange.com/
234.
https://diy.stackexchange.com/
235.
https://money.stackexchange.com/
236.
https://academia.stackexchange.com/
237.
https://law.stackexchange.com/
238.
https://fitness.stackexchange.com/
239.
https://gardening.stackexchange.com/
240.
https://parenting.stackexchange.com/
241.
https://stackexchange.com/sites#lifearts
242.
https://english.stackexchange.com/
243.
https://skeptics.stackexchange.com/
244.
https://judaism.stackexchange.com/
245.
https://travel.stackexchange.com/
246.
https://christianity.stackexchange.com/
247.
https://ell.stackexchange.com/
248.
https://japanese.stackexchange.com/
249.
https://chinese.stackexchange.com/
250.
https://french.stackexchange.com/
251.
https://german.stackexchange.com/
252.
https://hermeneutics.stackexchange.com/
253.
https://history.stackexchange.com/
254.
https://spanish.stackexchange.com/
255.
https://islam.stackexchange.com/
256.
https://rus.stackexchange.com/
257.
https://russian.stackexchange.com/
258.
https://gaming.stackexchange.com/
259.
https://bicycles.stackexchange.com/
260.
https://rpg.stackexchange.com/
261.
https://anime.stackexchange.com/
262.
https://puzzling.stackexchange.com/
263.
https://mechanics.stackexchange.com/
264.
https://boardgames.stackexchange.com/
265.
https://bricks.stackexchange.com/
266.
https://homebrew.stackexchange.com/
267.
https://martialarts.stackexchange.com/
268.
https://outdoors.stackexchange.com/
269.
https://poker.stackexchange.com/
270.
https://chess.stackexchange.com/
271.
https://sports.stackexchange.com/
272.
https://stackexchange.com/sites#culturerecreation
273.
https://mathoverflow.net/
274.
https://math.stackexchange.com/
275.
https://stats.stackexchange.com/
276.
https://cstheory.stackexchange.com/
277.
https://physics.stackexchange.com/
278.
https://chemistry.stackexchange.com/
279.
https://biology.stackexchange.com/
280.
https://cs.stackexchange.com/
281.
https://philosophy.stackexchange.com/
282.
https://linguistics.stackexchange.com/
283.
https://psychology.stackexchange.com/
284.
https://scicomp.stackexchange.com/
285.
https://stackexchange.com/sites#science
286.
https://meta.stackexchange.com/
287.
https://stackapps.com/
288.
https://api.stackexchange.com/
289.
https://data.stackexchange.com/
290.
https://stackoverflow.blog/?blb=1
291.
https://www.facebook.com/officialstackoverflow/
292.
https://twitter.com/stackoverflow
293.
https://linkedin.com/company/stack-overflow
294.
https://creativecommons.org/licenses/by-sa/4.0/
295.
https://stackoverflow.blog/2009/06/25/attribution-required/
Hidden links:
297.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
298.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
299.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
300.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
301.
https://stackexchange.com/
302.
https://stackexchange.com/
303.
https://meta.stackexchange.com/
304.
https://meta.stackexchange.com/posts/343302/timeline
305.
https://meta.stackexchange.com/users/135201/nick-craver
306.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
307.
https://meta.stackexchange.com/posts/343321/timeline
308.
https://meta.stackexchange.com/users/350567/ibug-is-disappointed-in-se
309.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
310.
https://meta.stackexchange.com/posts/343341/timeline
311.
https://meta.stackexchange.com/users/243091/federico-poloni
312.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
313.
https://meta.stackexchange.com/posts/343389/timeline
314.
https://meta.stackexchange.com/users/282094/rob
315.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
316.
https://meta.stackexchange.com/posts/343400/timeline
317.
https://meta.stackexchange.com/users/184688/e-p
318.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
319.
https://meta.stackexchange.com/posts/343368/timeline
320.
https://meta.stackexchange.com/users/221016/cnst
321.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
322.
https://stackoverflow.blog/2020/02/05/the-2020-developer-survey-is-now-open/
323.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
324.
https://meta.stackexchange.com/q/2267
325.
https://meta.stackexchange.com/q/271080
326.
https://meta.stackexchange.com/q/277369
327.
https://meta.stackexchange.com/q/292058
328.
https://meta.stackexchange.com/q/295285
329.
https://meta.stackexchange.com/q/297816
330.
https://meta.stackexchange.com/q/325060
331.
https://meta.stackexchange.com/q/333965
332.
https://meta.stackexchange.com/q/334575
333.
https://meta.stackexchange.com/q/336526
334.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services
335.
https://meta.stackexchange.com/questions/343302/tls-1-0-and-tls-1-1-removal-for-stack-exchange-services