Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

External Data Source
The semantics of online authentication in the web are rather straightforward: if Alice has a certificate binding Bob’s name to a public key, and if a remote entity can prove knowledge of Bob’s private key, then (barring key compromise) that remote entity must be Bob. However, in reality, many websites—and the majority of the most popular ones—are hosted at least in part by third parties such as Content Delivery Networks (CDNs) or web hosting providers....
This data repository is not currently reporting usage information. For information on how your repository can submit usage information, please see our documentation.