Nokia's Xpress Browser draws criticism over the way it handles HTTPS data

Advertisement
By Kunal Dua | Updated: 11 January 2013 17:24 IST
Nokia has been pushing its Xpress Browser, found in feature phones and the popular Asha series of phones, at every opportunity. The company claims the browser offers up to 90% savings in data costs by compressing data before transmission. Now, the browser is under criticism after the way it handles HTTPS traffic was brought to light.

Security blogger Gaurang K Pandya first wrote about the browser in December, highlighting that it was forcing traffic to go via Nokia's proxy server. No surprises there. All browsers which compress data - including Opera Mini and Amazon Silk - employ the same technique. In fact, Nokia's page linked above includes this nifty little image clearly depicting the same.


The outcry started when Pandya highlighted that Xpress Browser was routing secure HTTPS traffic via Nokia servers as well.

When you visit a website using your PC or mobile, the request is sent to the website's server, which responds with the data present on that page. The communication doesn't happen directly between your PC and the website's server, and the request as well as the response are sent via multiple intermediate servers.

Most traffic on the Web is sent over the insecure HTTP protocol (e.g. https://www.gadgets360.com), which means that it can be 'seen' by any one of these intermediaries. The HTTPS protocol (e.g. https://www.google.com) adds a secure layer on top of HTTP that mandates encryption of data exchanged between the two machines, which prevents any intermediaries from snooping in. Another important element of the HTTPS protocol are certificates, which are used to confirm the identity of machines. HTTPS is used for anything that requires secure communication, like transmitting credit card information or bank details.

Nokia's Xpress Browser, and indeed Opera Mini (which talks about the topic in detail in its FAQ) redirect all HTTP and HTTPS communication via their proxy servers. All your HTTPS requests are decrypted by their proxy, and re-encrypted before forwarding them to the secure site. The server's response is then intercepted by the proxy, decrypted and re-encrypted before sending back to the browser. The apps reportedly use pre-installed certificates to 'trick' the browser into trusting the data that is being sent by the proxy instead of the original site.

This means both Nokia and Opera can, at least theoretically, look at, and thus, store, your confidential data. Opera clearly mentions it does not collect any data in its FAQ. The terms of use of Nokia's browser weren't so clear, which sparked an outrage after Pandya shared his findings.

Nokia was forced to issued the following statement, clarifying it does not collect any data.

We take the privacy and security of our consumers and their data very seriously. The compression that occurs within the Nokia Xpress Browser means that users can get faster web browsing and more value out of their data plans. Importantly, the proxy servers do not store the content of web pages visited by our users or any information they enter into them. When temporary decryption of HTTPS connections is required on our proxy servers, to transform and deliver users' content, it is done in a secure manner.

Nokia has implemented appropriate organizational and technical measures to prevent access to private information. Claims that we would access complete unencrypted information are inaccurate.

We aim to be completely transparent on privacy practices. As part of our policy of continuous improvement we will review the information provided in the mobile client in case this can be improved.
Meanwhile, Pandya claims that Nokia has issued an update to its browser that means it is no longer decrypting the data on its servers, but the traffic is still flowing via its servers.

While that, along with Nokia's statement, should calm the nerves of most users, we believe a bit more time spent in educating users and having "sensible defaults" would go much farther in preventing such controversies from erupting in the future. Browsers like Amazon Silk leave HTTPS communication untouched even when they compress HTTP communication, and we believe that is a sensible way to go.

Amazon Silk routes secure (SSL) web page requests directly from your computer to origin servers so they do not pass through Amazon servers.
Even if companies like Nokia and Opera want to offer the ability to compress HTTPS data as a genuine benefit to users, they should have it as an application preference that is turned off by default. The users should be told exactly what this option entails before they flip that switch on.
Affiliate links may be automatically generated - see our ethics statement for details.

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Oppo Find X9 Series Price in India Leaked Again Ahead of Debut
  2. Redmi 15C 5G Chipset Details Leaked, Could Launch in India at This Price
  3. Poco F8 Series Will Be Launched Globally on This Date
  4. OnePlus Ace 6T Launch Timeline Revealed; Will Sport This Snapdragon Chip
  5. Xiaomi 17 and Xiaomi 17 Pro First Impressions
  6. Vivo X300 and Teleconverter Kit India Prices Tipped Ahead of Launch
  7. Raktabeej 2 Arrives on OTT Platforms This November: All You Need to Know
  8. Here's When the Nothing Phone 3a Lite Will Launch in India
  9. Indian Enterprises Increasingly Adopting AI for Internal Workflows: EY
  10. Steak 'n Shake Heads to El Salvador as Bitcoin Strategy Gains Momentum
  1. Bison Kaalamaadan OTT Release Date Confirmed: When and Where to Watch This Tamil Sports Action Drama Online?
  2. Steak ‘n Shake Expands to El Salvador as Bitcoin Strategy Gains Momentum
  3. Samsung Galaxy Buds 4 Pro Leak Hints at Refreshed Design, Head Gestures Feature
  4. Redmi 15C 5G Price in India, Key Specifications Leaked Ahead of Launch: Here’s How Much it Might Cost
  5. India Begins AI Adoption: 47 Percent of Enterprises Use AI for Multiple Use Cases, Says EY
  6. Nothing Phone 3a Lite India Launch Date Confirmed: Expected Specifications, Features
  7. Call of Duty: Black Ops 7 Draws Flak Over Alleged GenAI Use as Steam Player Count Underwhelms
  8. Apple Ordered to Pay Masimo $634 Million in Apple Watch Patent Dispute
  9. OnePlus Ace 6T Launch Timeline Confirmed; Will Debut This Month With Snapdragon 8 Gen 5 SoC
  10. Bitcoin Hovers Near $95,000 as Bearish Sentiment Dominates Crypto Market
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.