HPKP is generally considered DEPRECATED. It has been [disabled in
Google Chrome in 2017](https://www.zdnet.com/article/google-chrome-is-backing-away-from-public-key-pinning-and-heres-why/) and should generally not be used anymore.
Google Chrome in 2017][] and should generally not be used anymore.
[disabled in Google Chrome in 2017]: https://www.zdnet.com/article/google-chrome-is-backing-away-from-public-key-pinning-and-heres-why/
This section should generally be skipped unless you *really* need key
pinning for some obscure reason.
...
...
@@ -165,19 +170,25 @@ But there are other certificate authorities in use inside TPA and,
more broadly, at Tor. Here's the list of known CAs in operation at the
time of writing (2020-04-15):
* [Let's Encrypt](https://letsencrypt.org): automatically issues certificates for most websites
* [Let's Encrypt][]: automatically issues certificates for most websites
and domains, managed by TPA
* [Globalsign](https://globalsign.com): used by the [Fastly](https://www.fastly.com/) CDN used to distributed
* [Globalsign][]: used by the [Fastly][] CDN used to distributed
TBB updates
* [Digicert](https://www.digicert.com/): used by other teams to sign software releases for Mac and Windows
* [Digicert][]: used by other teams to sign software releases for Mac
and Windows
* [[Puppet]]: our configuration management infrastructure has its own
X.509 certificate authority which allows "Puppet agents" to
authenticate and verify the "Puppet Master", see [[our
documentation|puppet]] and [upstream documentation](https://puppet.com/docs/puppet/latest/ssl_certificates.html) for details
documentation|puppet]] and [upstream documentation][] for details
* internal "auto-ca": all nodes in Puppet get their own X.509
certificate signed by a standalone, self-signed X.509 certificate,