Connection upgrades automatically enhance your browsing security by upgrading connections to more secure protocols whenever possible. This feature helps protect your data and ensures you're using the most secure connection available for each website.
What are Connection Upgrades?
Connection upgrades automatically enhance the security of your web connections by upgrading from less secure protocols to more secure ones. This happens transparently in the background, ensuring you always use the best available security for each connection.
How It Works
- Automatically detects available protocols
- Upgrades to more secure options
- Maintains connection stability
- Works transparently in background
- Enhances security automatically
Security Benefits
- Stronger encryption protocols
- Enhanced data protection
- Improved privacy
- Better resistance to attacks
- Automatic security improvements
Types of Connection Upgrades
Oasis can upgrade various types of connections to enhance your security:
HTTP to HTTPS
Automatically upgrades insecure HTTP connections to encrypted HTTPS connections when the website supports it, protecting your data from interception.
TLS Version Upgrades
Upgrades from older TLS versions (like TLS 1.0 or 1.1) to newer, more secure versions (TLS 1.2 or 1.3) when available.
DNS Protocol Upgrades
Upgrades DNS queries to use more secure protocols like DNS-over-HTTPS (DoH) or DNS-over-TLS (DoT) when supported.
How Connection Upgrades Work
The connection upgrade process happens automatically and transparently:
Protocol Detection
When you connect to a website, Oasis automatically detects what security protocols the server supports and what's currently being used.
Security Assessment
The browser evaluates the current connection security and identifies if a more secure protocol is available.
Automatic Upgrade
If a more secure protocol is available, Oasis automatically upgrades the connection without interrupting your browsing experience.
Security Protocol Hierarchy
Web Connections (HTTP/HTTPS)
- HTTP (Least Secure): Plain text transmission, vulnerable to interception
- HTTPS (More Secure): Encrypted transmission, protects data
- HTTPS with HSTS (Most Secure): Forces HTTPS and prevents downgrade attacks
TLS Protocol Versions
- TLS 1.0/1.1 (Older): Less secure, vulnerable to attacks
- TLS 1.2 (Better): More secure, widely supported
- TLS 1.3 (Best): Most secure, fastest, latest standard
DNS Security
- Standard DNS (Insecure): Plain text queries, vulnerable to interception
- DNS-over-HTTPS (Secure): Encrypted DNS queries
- DNS-over-TLS (Secure): Alternative encrypted DNS method
Benefits of Connection Upgrades
Security Enhancements
- Stronger encryption algorithms
- Better protection against attacks
- Reduced vulnerability to interception
- Enhanced privacy protection
- Improved resistance to tampering
Performance Improvements
- Faster connection establishment
- Reduced latency with newer protocols
- Better connection efficiency
- Improved browsing speed
- Enhanced user experience
Automatic vs Manual Upgrades
Automatic Upgrades
- Happen transparently in background
- No user intervention required
- Always use best available security
- Seamless user experience
- Consistent security improvements
Manual Configuration
- User can configure specific settings
- Customize upgrade preferences
- Set security requirements
- Override automatic behavior
- Advanced user control
Connection Upgrade Scenarios
Website Access
- HTTP sites automatically upgraded to HTTPS
- Older TLS versions upgraded to newer ones
- Mixed content issues resolved
- Security warnings reduced
- Enhanced browsing experience
DNS Resolution
- Standard DNS upgraded to encrypted DNS
- DNS queries protected from interception
- Improved privacy for domain lookups
- Better resistance to DNS attacks
- Enhanced overall security
API and Service Connections
- Backend service connections upgraded
- API calls use secure protocols
- Data transmission protected
- Service integration enhanced
- Overall system security improved
Configuration Options
Automatic Settings
- Enable automatic connection upgrades
- Configure upgrade preferences
- Set security requirements
- Choose upgrade strategies
- Manage fallback behavior
Advanced Configuration
- Customize protocol preferences
- Set minimum security levels
- Configure upgrade timeouts
- Manage connection pooling
- Set up monitoring and logging
Monitoring and Verification
Connection Status
- Check current protocol being used
- Verify upgrade success
- Monitor connection quality
- Track security improvements
- Identify upgrade failures
Security Indicators
- Browser security badges
- Connection protocol indicators
- Security level displays
- Upgrade status notifications
- Security warning messages
Troubleshooting
Common Issues
- Upgrades not happening automatically
- Connection failures after upgrades
- Performance issues with upgrades
- Compatibility problems
- Security warnings still appearing
Solutions
- Check upgrade settings and preferences
- Update browser to latest version
- Clear browser cache and cookies
- Verify website protocol support
- Contact website administrators
Best Practices
Security Recommendations
- Always enable automatic upgrades
- Use minimum TLS 1.2 requirement
- Enable DNS-over-HTTPS
- Regularly update browser
- Monitor connection security
User Guidelines
- Trust automatic upgrade decisions
- Pay attention to security indicators
- Report upgrade failures
- Use supported browsers
- Keep systems updated
What to Expect
When using connection upgrades, you may experience:
Security Benefits
- Enhanced data protection
- Improved privacy
- Better resistance to attacks
- Stronger encryption
- Reduced security risks
User Experience
- Seamless automatic upgrades
- Improved browsing performance
- Fewer security warnings
- Better connection stability
- Enhanced overall experience
Technical Details
Connection upgrades use advanced networking and security technologies:
How Connection Upgrades Work
- Protocol Negotiation: Automatically negotiates the best available security protocol
- Seamless Transition: Upgrades connections without interrupting user experience
- Fallback Handling: Gracefully handles cases where upgrades aren't available
- Performance Optimization: Balances security with connection speed
- Compatibility Management: Ensures upgrades work with various server configurations
Since Oasis is built on Firefox core technology, connection upgrades provide the same robust security enhancements with automatic protocol optimization and seamless user experience.
Need Help with Oasis Browser?
Join our Discord community to get support, ask questions, and connect with other Oasis users and the Kahana team.
Related Documentation
Deceptive Content and Dangerous Software Protection
Learn how Oasis protects you from phishing attacks, malware, and other deceptive content that could harm your device or compromise your security.
HTTPS-Only Mode
Learn how HTTPS-Only Mode ensures secure connections to websites by only allowing encrypted HTTPS connections and prompting before insecure connections.
Password Manager - Alerts for breached websites
Learn how to receive alerts about passwords for breached websites and protect your accounts from security threats.
About the Author

I'm the CTO of Kahana, bringing a unique perspective from my management consulting experience at Clarkston Consulting and biomedical engineering background from Duke University. I'm focused on making the future of work more ergonomic through innovative technology solutions that prioritize user well-being and productivity.