Phasing Out Certificates with SHA-1 based Signature Algorithms Many of the certificates used by secure websites today are signed using algorithms based on a hash algorithm called SHA-1. The integrity of the hash algorithm used in signing a certificate is a critical element in the security of the certificate. Weaknesses in hash algorithms can lead to situations in which attackers can obtain fraudul
![Phasing Out Certificates with SHA-1 based Signature Algorithms – Mozilla Security Blog](https://cdn-ak-scissors.b.st-hatena.com/image/square/3edcf8fc3d8dccaaaf948b4d3355440f35b34b36/height=288;version=1;width=512/https%3A%2F%2Fblog.mozilla.org%2Fsecurity%2Fwp-content%2Fthemes%2FOneMozilla%2Fimg%2Fmozilla-wordmark.png)