Since then, many big sites such as Twitter, Facebook, Hotmail and others have either turned on HTTPS by default or have given the option to its users to switch it on.
Having partially achieved his goal, Butler hasn't bothered with updating the extension, which hasn't worked since Firefox 3.x.
Still, there are other developers who have taken up the torch, and among them is Matthew Sullivan, a graduate student in the Information Assurance and Computer Engineering departments at Iowa State University, who on Sunday presented his "Cookie Cadger" to the crowd assembled at this year's DerbyCon.
"Cookie Cadger is a graphical utility which harnesses the power of the Wireshark suite and Java to provide a fully cross-platform, entirely open-source utility which can monitor wired Ethernet, insecure Wi-Fi, or load a packet capture file for offline analysis," Sullivan explains on the program's official website.
It's an open source pen-testing tool made for intercepting and replaying specific insecure HTTP GET requests into a browser.
You can download the app immediately if you are prepared to pay at least $10 (the proceeds go to Hackers for Charity), or you can wait a few weeks and download the source code for free.
The tool works on Windows, Linux, or Mac, and requires Java 7 and “tshark” – a utility that's part of the Wireshark suite.
"Additionally, to capture packets promiscuously requires compatible hardware. Capturing Wi-Fi traffic requires hardware capable of monitor mode, and the knowledge of how to place your device into monitor mode," Sullivan adds, and points out that the software is still in beta, so issues and bugs are likely.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.