HSTS was supposed to solve this. And it mostly does — for the 20% of the web that actually uses it properly. For everything else, there's a gap between "should be HTTPS" and "actually is HTTPS." That's the gap PhishClean fills.
Navigation from HTTPS to HTTP — the classic SSL stripping pattern. PhishClean tracks your session and alerts when you're redirected from a secure page to an insecure one.
When you follow a link from an HTTPS site to an HTTP page. Not always malicious, but often a sign of a misconfigured or compromised site. PhishClean notes it as a risk signal.
A password field on an unencrypted page means your credentials will be sent in plain text. PhishClean flags this immediately — no matter how legitimate the site looks.
HSTS (HTTP Strict Transport Security) is a good idea with real-world gaps. Here's where it falls short:
max-age directive. If you don't visit a site for a while and the policy expires, you're back to square one — vulnerable on the next visit, just like the first time.includeSubDomains. Many don't. So secure-login.example.com might be protected while portal.example.com isn't.For the full technical breakdown of how attackers exploit these gaps, read our deep dive on SSL stripping attacks.
HSTS is a server-side declaration. It depends on the server doing the right thing, and on your browser having seen that declaration before. PhishClean doesn't depend on either.
PhishClean monitors your session in real time, at the browser level. It works on the first visit. It works on sites that don't send HSTS headers. It works after you've cleared your browsing data. It doesn't care whether the server is configured correctly — it watches what actually happens to your connection and reacts to it.
Think of it this way: HSTS is a lock the website puts on its own door. PhishClean is you checking whether the door is actually locked before you walk through it. Both are useful. But only one works when the site owner forgot to install the lock.
No. PhishClean doesn't block anything by default — it warns you. Plenty of legitimate sites still serve content over HTTP, especially older documentation pages, local network tools, and IoT device dashboards. Blocking HTTP entirely would break too many things. Instead, PhishClean flags the downgrade as one risk signal among many. If an HTTP page also has a suspicious domain, a login form, or other red flags, the combined score triggers an alert. A plain HTTP page on its own usually won't.
No. PhishClean excludes localhost and local network addresses from downgrade detection. Your development workflow won't be interrupted by warnings about http://localhost:3000 or http://127.0.0.1. This exemption applies to all RFC 1918 private addresses as well, so internal network tools and admin panels won't trigger false positives.
PhishClean detects HTTPS downgrades and SSL stripping in real time — locally, in your browser. 3-day free trial, no credit card required.
Install PhishClean