[security/faq.md] Use HTTPS links whenever possible

en.wikipedia.org, 33bits.org, freehaven.net, tools.ietf.org, and
dev.chromium.org all support HTTPS, so change the protocol of these
links to HTTPS.

[email protected]

Bug: 
Change-Id: I338378c6ec3facf7640e6ed81addf0c4601814d9
Reviewed-on: https://chromium-review.googlesource.com/671546
Reviewed-by: Eric Lawrence <[email protected]>
Commit-Queue: Eric Lawrence <[email protected]>
Cr-Commit-Position: refs/heads/master@{#503506}
diff --git a/docs/security/faq.md b/docs/security/faq.md
index e9356da..c367c68 100644
--- a/docs/security/faq.md
+++ b/docs/security/faq.md
@@ -259,12 +259,12 @@
 
 As discussed in [Issue 49075](https://crbug.com/49075), we currently do not
 attempt to defeat "passive fingerprinting" or
-"[evercookies](http://en.wikipedia.org/wiki/Evercookie)" or [ETag
-cookies](http://en.wikipedia.org/wiki/HTTP_ETag#Tracking_using_ETags), because
+"[evercookies](https://en.wikipedia.org/wiki/Evercookie)" or [ETag
+cookies](https://en.wikipedia.org/wiki/HTTP_ETag#Tracking_using_ETags), because
 defeating such fingerprinting is likely not practical without fundamental
 changes to how the Web works. One needs roughly 33 bits of non-correlated,
 distinguishing information to have a good chance of telling apart most user
-agents on the planet (see [Arvind Narayanan's site](http://33bits.org/about/)
+agents on the planet (see [Arvind Narayanan's site](https://33bits.org/about/)
 and [Peter Eckersley's discussion of the information theory behind
 Panopticlick](https://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy).)
 
@@ -276,7 +276,7 @@
 tolerate the breakage that it would likely be easier to distinguish people who
 use the fingerprint-defense configuration. (See "[Anonymity Loves Company:
 Usability and the Network
-Effect](http://freehaven.net/anonbib/cache/usability:weis2006.pdf)" by
+Effect](https://freehaven.net/anonbib/cache/usability:weis2006.pdf)" by
 Dingledine and Mathewson for more information.)
 
 There is a pretty good analysis of in-browser fingerprinting vectors on [this
@@ -349,7 +349,7 @@
 connecting to the true web server and not an impostor. Some sites request an
 even higher degree of protection for their users (i.e. you): they assert to
 Chrome (via Strict Transport Security —
-[HSTS](http://tools.ietf.org/html/rfc6797) — or by other means) that any
+[HSTS](https://tools.ietf.org/html/rfc6797) — or by other means) that any
 server authentication error should be fatal, and that Chrome must close the
 connection. If you encounter such a fatal error, it is likely that your network
 is under attack, or that there is a network misconfiguration that is
@@ -387,7 +387,7 @@
 Chrome does not perform pin validation when the certificate chain chains up to a
 private trust anchor. A key result of this policy is that private trust anchors
 can be used to proxy (or
-[MITM](http://en.wikipedia.org/wiki/Man-in-the-middle_attack)) connections, even
+[MITM](https://en.wikipedia.org/wiki/Man-in-the-middle_attack)) connections, even
 to pinned sites. “Data loss prevention” appliances, firewalls, content filters,
 and malware can use this feature to defeat the protections of key pinning.
 
@@ -466,7 +466,7 @@
 
 Chrome's primary mechanism for checking the revocation status of HTTPS
 certificates is
-[CRLsets](http://dev.chromium.org/Home/chromium-security/crlsets).
+[CRLsets](https://dev.chromium.org/Home/chromium-security/crlsets).
 
 Chrome also supports Online Certificate Status Protocol (OCSP). However, the
 effectiveness of OCSP is is essentially 0 unless the client fails hard (refuses
@@ -479,7 +479,7 @@
 not stapled to the certificate) is a much better solution to the revocation
 problem than non-stapled OCSP. CAs and browsers are working toward that solution
 (see the
-[Internet-Draft](http://tools.ietf.org/html/draft-hallambaker-tlssecuritypolicy-03)).
+[Internet-Draft](https://tools.ietf.org/html/draft-hallambaker-tlssecuritypolicy-03)).
 
 Additionally, non-stapled OCSP poses a privacy problem: in order to check the
 status of a certificate, the client must query an OCSP responder for the status