# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 24
# self = https://watcher.sour.is/conv/d6alaoq
Learned a cute little trick on github today and figured I'd share in case there are others like me who didn't know this.

If you are using a chrome/chromium based browser and hit a site with an expired certificate, you can click anywhere in the whitespace of the error page, type "thisisunsafe" (all one word), hit enter, and be brought to the page.

Right now https://nitter.net is having certificate issue so you can test it there.

Anyway, obviously be careful because bypassing a warning about an expired certificate is potentially dangerous.
@abucci Thanks tip and reminder πŸ‘Œ I always forget the special keyword to type on those rare occasions you need to bypass the bad/invalid cert. And yes I can confirm nitter.net is having cert issues, I actually confirmed this earlier today but forgot to mention to you...
@abucci Thanks tip and reminder πŸ‘Œ I always forget the special keyword to type on those rare occasions you need to bypass the bad/invalid cert. And yes I can confirm nitter.net is having cert issues, I actually confirmed this earlier today but forgot to mention to you...
@prologic cool thing about nitter is that you can self host!

There is a list of alternate instances you can use here: https://github.com/zedeus/nitter/wiki/Instances
@abucci Bypassing a warning about an expired certificate is basically never actually dangerous. I have yet to see a maliciously used expired certificate in the wild.
Unfortunately, I feel that right now the people who decide on how to run PKI are so far removed from the real world and practical concerns, it's straight up comical. 81% of organizations have had outages caused by expired certificates, something that has almost no real world security benefit. https://betanews.com/2022/03/22/81-percent-of-organizations-have-outages-caused-by-expired-certificates/
@ocdtrekkie 81%!
@abucci I literally had to fix an outage this weekend caused by a weird certificate. Not external facing, but the security risk caused by it was nonexistent, and yet, it was implemented as a requirement and caused random unexpected breakage when it expired itself.
@ocdtrekkie I get what you're saying, but I can't shake the feeling that there's a "preparedness paradox" at work here. How many problems would exist that we don't currently have if there were no TLS / PKI?
@ocdtrekkie I am part of the 81%.
@abucci @ocdtrekkie Let alone how many problems wouldn't exist if we did not have computers!? :-D
@lyse oof you said it
@lyse Damn technology! πŸ˜›
@abucci I think TLS is fine. I think PKI is a crock of garbage, because most participants in PKI are garbage, and Google has complete capture of it and makes decisions that work best for it, and not the real world.

Ultimately what I think should happen for certificate expiration is browsers should soft-warn for like a week or two after expiry, with like a yellow address bar, as opposed to trying to block navigation. The risk of an expired cert just doesn't justify browser behavior.
@lyse We tricked rocks into thinking, and this how they get back at us for it, because thinking is a horrible curse.
@ocdtrekkie Going from fully, safely browsable to 🚨STOP!!! YOU WILL BE HAXXED IF U VISIT🚨 overnight is pretty harsh. Why not have the warning *before* certificate expiration, though? Does it really matter? One way or another you're cutting someone off from using the site eventually.

Back in the Good Old Days you could email webmaster@example.com, ask them if their site was still working correctly, and expect an answer. I guess back in the Good Old Days you didn't expect instantaneous delivery of content at all times forever, though.
@abucci
and

πŸ˜…
@eaplmx I think I want one!
@abucci Whether warning before or after the date is somewhat immaterial, except it slides the sysadmin window even narrower, for no good reason. Google's already aggressively forced everyone to a 12 month deadline. Not everything supports Let's Encrypt. And so every year we have a window where I have to rush around and update all the certs before the expiration date, but if I start the process too soon, then I am doing it every eleven months, because of that absolute 12 month cap.

And again, there's nothing inherently less secure about a 13 month old cert than a 12 month old cert. About 99% of certificate behavior is security theater and Google flexing it's ability to force everyone to do what it says.
@ocdtrekkie ah yeah that's a good point.
@abucci you can also simply click "advanced" and choose to ignore manually if you don't remember the keywords.

I'm surprised Firefox doesn't let you even open it at all, has anyone managed to bypass a failed certificate there?
@justamoment that's the thing--in the instance I posted, that option was not available. Its possible they were using HSTS. the only thing that worked was the thisisunsafe business
@abucci mmh, interesting...