TLS, which stands for Transport Layer Security, is a cryptographic protocol designed to provide secure communication over a computer network, such as the internet. It is the successor to SSL (Secure Sockets Layer), and although the terms are sometimes used interchangeably in the industry, TLS is the more modern and secure version.


Check completed with warnings

Status TLS version Description
TLS Version 1.0 TLS 1.0, introduced in 1999, offers encryption and authentication for network communications, but due to discovered vulnerabilities, it's now largely deprecated in favor of more secure versions.
TLS Version 1.1 TLS 1.1, introduced in 2006 to provide secure web communication, but it's now considered outdated and potentially vulnerable compared to newer versions.
TLS Version 1.2 TLS 1.2, introduced in 2008, is an improved cryptographic protocol for secure web communication, offering enhanced security features and algorithms over its predecessors.
TLS Version 1.3 TLS 1.3, introduced in 2018, is the latest version of the cryptographic protocol for secure web communication, offering streamlined handshake processes and advanced security features compared to previous versions.

Old TLS versions are still in use

This host uses depricated TLS versions, This host relies on deprecated TLS versions, which implies that it employs outdated security protocols. This could potentially expose users to known vulnerabilities and increase the site's vulnerability to cyberattacks. The use of deprecated TLS (Transport Layer Security) protocols indicates a reliance on older and less secure TLS versions for secure communication. This introduces security risks due to the known vulnerabilities associated with these outdated protocols and may lead to non-compliance with security standards. Additionally, careful attention must be given to compatibility issues with older clients. To enhance security and adhere to best practices, it is advisable to upgrade to more secure TLS versions.meaning the site relies on outdated security protocols, potentially exposing users to known vulnerabilities and making the site more susceptible to cyberattacks.