Web sites using the SHA-1 Signature hash algorithm are displayed in the browser without even a warning. (Brave 0.8.2). I believe Brave should block connections to such sites as Firefox already does, and Chrome, IE and Edge by Jan 01 2017.
I think we should display sha1 certs as non-secure. Right now there is no way to get cert info unless there's a certificate error but that is a todo for 1.0.
Would you need an extra prop to check in in SiteInfo.render(), other than isSecure and isMixedContent to set the icon to (some colour lock/unlock)?
Or would you set a certificate error (which I think happens via an electron ipc.send() call from the loadStart() event listener in Frame.addEventListners) and deal with it like that?
We would modify our fork of electron to send the cert info via IPC when the tls connection is established.
Adding @bridiver for this.
cert information could be made available in the navigation-entry-commited event
it would be useful if electron could send the parsed x509 cert info in addition to the raw cert, so the browser doesn't have to re-parse it in JS. the only fields i can think of that the front-end needs to know about (for now) are whether there's a SHA1 signature in the chain and whether the end cert is Extended Validation. though if the user wants to inspect the cert, it's handy to show them both the raw cert and the parsed fields.
it is available from AtomSecurityStateModelClient and we could fire an event when it changes with SecurityStyleChanged
Setting 1.0 milestone based on the comment by @diracdeltas above.
As of 0.12.9, Brave will show the insecure UX for sha1 certs that expire after 2017. Hooray!

Test Plan:
Most helpful comment
As of 0.12.9, Brave will show the insecure UX for sha1 certs that expire after 2017. Hooray!

Test Plan: