Session hijacking
IS NOT necessarily the same as cookie stealing. Nobody can claim they can protect you from cookie stealing unless they are lying to you. Session hijacking can also be performed through session fixation, cross site scripting and clickjacking. The former two are dealt by in the Joomla! core, the latter can be protected against through Admin Tools' .htaccess Maker. Moreover what they call "session protection" is the same as our SessionShield which only really applies to Jooma! 3.4.5 and earlier. Later versions include the security fix we submitted to Joomla! in the week between December 17th and 24th, 2015.
Regarding SSL certificates, self-signed certificates are not a good idea for public sites. If you have sites where the cost of a commercial SSL certificate is prohibitive you can issue one for free through
Let's Encrypt. Recent versions of cPanel do offer an integration with it.
The signing certificate authority does not matter as far as performance goes. On top of that, if you have a decent server, i.e. a server that's been updated in the last 7 years, the performance drop is
less than 3%. For a typical Joomla! site that translates to under 50 msec or 0.05 seconds – well below the standard deviation in load times. If you are experiencing a significant performance hit it's time to look for a different hosting company. Neither our business site (on HTTPS since 2010) or my blog site (on HTTPS since two weeks ago) had any measurable performance impact from the switch to HTTPS. Do note that I use two good quality hosts, SiteGround and Rochen.
Nicholas K. Dionysopoulos
Lead Developer and Director
🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!