Engineering Feb 5, 2026 7 min read

How HTTPS makes any website a verification source

TLS certificates authenticate server identity on every HTTPS connection. Burnt uses this existing chain of trust to verify data from authenticated web sessions.

Every time you visit a website, your browser performs a security ritual that most people never notice. It checks the server's TLS certificate, verifies the certificate chain back to a trusted root authority, and establishes an encrypted connection. This happens in milliseconds, on every page load, billions of times per day across the internet. The primary purpose is security — preventing eavesdropping and man-in-the-middle attacks. But the same mechanism proves something else entirely: the identity of the server you are talking to.

That proof of identity is the foundation of how Burnt verifies data from any website.

What does HTTPS actually guarantee?

HTTPS is HTTP over TLS (Transport Layer Security). The TLS protocol does two things: it encrypts the connection so third parties cannot read the data in transit, and it authenticates the server's identity so you know who you are communicating with. The second property — server authentication — is the one that matters for verification.

Here is how server authentication works. When you connect to chase.com, the server presents a TLS certificate issued by a Certificate Authority (CA) like DigiCert or Let's Encrypt. That certificate binds the domain name "chase.com" to a specific public key. The CA has verified that the entity requesting the certificate controls the domain. Your browser checks the certificate's validity, confirms it was issued by a trusted CA, and verifies the cryptographic chain. If everything checks out, the browser knows — with mathematical certainty — that it is communicating with a server authorized to operate as chase.com.

This chain of trust is built on a hierarchy of Certificate Authorities. Root CAs are embedded in your operating system and browser. They sign intermediate CA certificates, which in turn sign server certificates. The entire chain is verifiable by anyone. The system has been running at internet scale for over two decades, and it processes billions of certificate validations every day.

What the browser already knows

When you log into your bank over HTTPS, your browser has already verified that you are talking to the real server. The data the server returns — your account balance, transaction history, account status — is guaranteed to come from that authenticated server. Not from a phishing site. Not from a man-in-the-middle. From the server that the Certificate Authority confirmed controls that domain. This is the same guarantee that protects online banking, e-commerce, and every other sensitive web interaction.

How does Burnt use TLS for verification?

Burnt builds on top of the trust that TLS already establishes. When a user needs to verify data from a web source — say, their bank balance exceeds a threshold, or their employer's HR portal shows active employment — the process works like this:

The critical distinction is provenance. The data is not just extracted from a website. It is extracted from a website whose identity has been verified through the TLS certificate chain. The fact that the data came from the claimed source is cryptographically proven, not assumed.

How is this different from screen scraping?

Screen scraping and TLS-based verification may appear similar on the surface — both involve extracting data from a website. But the difference is fundamental, and it matters for anyone relying on the output.

A screen scraper loads a web page and copies the visible content. It might parse the HTML, extract text, and report what it finds. But it makes no assertion about where that data came from. The scraped content could be from the real website, from a cached copy, from a locally modified version, or from a completely fabricated page. The scraper has no way to tell, and neither does anyone consuming its output.

Burnt's approach is different in three ways:

The analogy is the difference between photocopying a document and verifying it at the issuing office. A scraper produces a copy. Burnt produces a verified fact with provenance.

Every HTTPS connection already proves you are talking to the real server. Burnt uses that proof to verify the data the server returns. The trust infrastructure was already there — we just built on top of it.

What does this unlock beyond email verification?

DKIM-based email verification, which we covered in a previous post, is powerful but bounded. It works for any data source that sends email — which is most organizations — but it is limited to the information that appears in transactional emails. A booking confirmation contains a flight number and date. A pay notification contains a pay amount and period. But the email does not contain everything the source knows about the user.

HTTPS/TLS-based verification removes that boundary. It covers any data visible in a user's authenticated web session. This opens up verification sources that email cannot reach:

Together, DKIM and HTTPS/TLS cover virtually every digital data source. DKIM handles any organization that sends email. HTTPS handles any organization that runs a website. Between them, the gap in verification coverage effectively disappears.


The infrastructure for web-based verification has been hiding in plain sight. TLS certificates have been authenticating server identities for decades. Every browser performs this verification automatically, on every connection, without the user or the server doing anything special. The chain of trust from Certificate Authorities to server certificates is well-established, universally deployed, and cryptographically sound.

It was built to secure web connections. It also happens to provide exactly the trust foundation needed to verify data from any website on the internet.

Frequently asked questions

HTTPS uses TLS certificates to prove the identity of the server you are communicating with. When a user logs into their bank's website over HTTPS, the TLS certificate chain proves the data is coming from the real bank server. Burnt verifies this certificate chain and extracts specific data points from the authenticated session.

No. Screen scraping copies visible content without verifying where it came from. Burnt verifies the TLS certificate chain to confirm the server's identity, then extracts data from a cryptographically authenticated session. The difference is provenance: Burnt can prove the data came from the claimed source.

Any website that uses HTTPS and has a user login can serve as a verification source. This includes banks, employers, government portals, insurance carriers, airlines, utilities, and any other organization that provides user accounts. Over 95% of the web is now served over HTTPS.

DKIM verifies data from email sources, while HTTPS/TLS verifies data from web sources. Together they cover virtually every digital data source. DKIM handles any organization that sends email. HTTPS handles any organization with a website. The combination provides near-universal verification coverage.

Share

Burnt Team

The team behind Burnt builds verified data infrastructure that goes straight to the source.

Related posts

EngineeringFeb 18, 2026
How DKIM signatures make email verification possible
ProductMar 1, 2026
Why we do not need API partnerships to verify data from any source

Turn any website into a verification source.

See how Burnt uses existing HTTPS infrastructure to verify data from any authenticated web session.