1 - No VPN software
2 - Latest version of firefox - 58.01
3 - No malware malwarebytes, rootkit checker, etc all clear.
4 - I do have a Fritzbox runnig at present which seems to cache or mess up DNS occasionally but having never been to that site before where would I get a cached version of the certificate from?
5 - no other sites present the same issue.
6 - Am with bigpipe - seeing a lot of site time outs on and off - they claim no issues but we are seeing a lot of tracerts to 126.96.36.199 , grc.com, stuff.oc.nz etc timing out or dying.
7 - GRC.com verification of sites show we are getting the same cert SHA finger print as they are - showing no man in the middle attack is present , unless both GRC and myself have the same attacker ( not likely)
8 - Why would we get the same cert as previous posters unless it was presented from the site?
Checks done both with nad without Eset running.
The issues with eset certs are often when the browser hasn't picked up the cert install when the antivirus is installed. Once the intermediate certs are installed all is generally well - but eset doesn't MITM https sites - unless they have figured out how to spoof the SHA finger print which is theoretically improbable with todays processing power.
Today the certificate has been corrected - however the logon process is still awful - Clicking on the drop down box causes the options to slide away - causing you to try to log in over nad over and over and over and over ... you get the idea.