Feature Request: Detect and Warn About Self-Signed Certificate Changes
Problem
When users accept a self-signed HTTPS certificate, the browser trusts it indefinitely without verifying its integrity on subsequent connections. This creates a significant security risk, as users remain unaware if the certificate changes, potentially exposing them to man-in-the-middle attacks.
Solution
Implement a mechanism to store the fingerprint of accepted self-signed certificates. If the certificate changes in the future, the browser should immediately warn the user, similar to SSH host key verification.
Impact
This feature is critical for protecting users against silent attacks, ensuring they are alerted to potential compromises or unauthorized changes in trusted servers.