:mima_rule: Mima-sama<p><span>Hey, remember when I said that </span><a href="https://makai.chaotic.ninja/tags/HTTP2" rel="nofollow noopener noreferrer" target="_blank">#HTTP2</a><span>'s spec doesn't require TLS for it to be used, but de-facto it is necessary anyway because mainstream browsers like </span><a href="https://makai.chaotic.ninja/tags/Firefox" rel="nofollow noopener noreferrer" target="_blank">#Firefox</a><span> and </span><a href="https://makai.chaotic.ninja/tags/Chrome" rel="nofollow noopener noreferrer" target="_blank">#Chrome</a><span> will not support </span><a href="https://makai.chaotic.ninja/tags/HTTP" rel="nofollow noopener noreferrer" target="_blank">#HTTP</a><span>/2 without </span><a href="https://makai.chaotic.ninja/tags/HTTPS" rel="nofollow noopener noreferrer" target="_blank">#HTTPS</a><span>?<br><br>Well I just realized now that thanks to </span><a href="https://makai.chaotic.ninja/tags/Mozilla" rel="nofollow noopener noreferrer" target="_blank">#Mozilla</a><span> and </span><a href="https://makai.chaotic.ninja/tags/Google" rel="nofollow noopener noreferrer" target="_blank">#Google</a><span>'s arbitrary limitations, they've actually made browsing the web with </span><a href="https://makai.chaotic.ninja/tags/I2P" rel="nofollow noopener noreferrer" target="_blank">#I2P</a><span>, </span><a href="https://makai.chaotic.ninja/tags/Tor" rel="nofollow noopener noreferrer" target="_blank">#Tor</a><span> (via onion/hidden services), and </span><a href="https://makai.chaotic.ninja/tags/Yggdrassil" rel="nofollow noopener noreferrer" target="_blank">#Yggdrassil</a><span> slower than it should be! The latency in Tor is so damn high that you essentially have to sacrifice speed if you're going to use an onion service that doesn't have an HTTPS certificate (which is unnecessary in the </span><a href="https://makai.chaotic.ninja/tags/encryption" rel="nofollow noopener noreferrer" target="_blank">#encryption</a><span> front because your connection to the onion is already encrypted!).<br><br>And I'm not even alone in this thought, look at this comment in </span><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1418832#c9" rel="nofollow noopener noreferrer" target="_blank"><span>bug 1418832</span></a><span> which never got a response from Mozilla.<br><br>Basically if you're a Tor hidden service operator, Firefox's devs are telling you to chalk up that $30 TLS certificate from harica.gr for the HTTP/2, and if you're operating a website over I2P or Yggdrasil, well "fuck your </span><a href="https://makai.chaotic.ninja/tags/privacy" rel="nofollow noopener noreferrer" target="_blank">#privacy</a><span>, get stuck in HTTP/1.1 lol"<br><br>I normally dunk on HTTP/2 (and personally I'm not even a fan of Tor) but this stupid decision by Mozilla as well as the equally stupid decision to drop HTTP/1.1 </span><a href="https://makai.chaotic.ninja/tags/pipelining" rel="nofollow noopener noreferrer" target="_blank">#pipelining</a><span> means downstream (which Tor Browser is) will have to deal with this bullshit speed bump. HTTP/2's </span><a href="https://makai.chaotic.ninja/tags/multiplexing" rel="nofollow noopener noreferrer" target="_blank">#multiplexing</a><span> would've helped greatly in these average high latency situations!<br><br>This is why you never let politician-wannabes control your development</span></p>