TLS 1.3 works in Chrome 70+, Edge 79+, Firefox 63+, Safari 12.1+, Opera 57+, and Samsung Internet 10.1+. IE 11 has no support. See features and known issues.

Prince Dewani
May 1, 2026
TLS 1.3 is the latest Transport Layer Security protocol that the IETF published as RFC 8446 to encrypt web traffic. It works in Chrome 70+, Edge 79+, Firefox 63+, Safari 12.1+ on macOS, Safari 12.2+ on iOS, Opera 57+, and Samsung Internet 10.1+, while Internet Explorer 11 has no support.
This guide covers what TLS 1.3 is, the browsers that support it, the key features, how it differs from TLS 1.2, how to enable it, and the known issues.
TLS 1.3 is the Transport Layer Security protocol version that the IETF standardized as RFC 8446. It encrypts data between a browser and a server using a faster handshake and a smaller cipher suite list than TLS 1.2. Web browsers, web servers, load balancers, and CDNs use it to secure HTTPS traffic.
TLS 1.3 works in every major modern browser, including Chrome, Edge, Firefox, Safari, Opera, and Samsung Internet, on desktop and mobile. Internet Explorer 11 is the only mainstream browser that never added support.
Chrome supports TLS 1.3 from Chrome 70 on Windows, macOS, Linux, ChromeOS, and Android, with the protocol on by default. Chrome 54 to 69 carried draft revisions of TLS 1.3 disabled by default behind chrome://flags. Chrome 4 to 53 did not support TLS 1.3 at all.
Microsoft Edge supports TLS 1.3 from Edge 79 on Windows, macOS, Linux, and Android, the build that switched to the Chromium engine. The pre-Chromium EdgeHTML versions 12 to 18 did not enable TLS 1.3 by default. Edge for Android tracks Chromium for Android, so it gets TLS 1.3 on every recent Android phone and tablet.
Firefox supports TLS 1.3 from Firefox 63 on Windows, macOS, Linux, and Android, where Mozilla shipped the final RFC 8446 version enabled by default. Firefox 49 to 62 had earlier TLS 1.3 drafts behind the security.tls.version.max preference in about:config. Firefox for Android picks up TLS 1.3 from the same release line.
Safari supports TLS 1.3 from Safari 12.1 on macOS 10.14.4 and from Safari 12.2 on iOS and iPadOS. Earlier Safari builds on macOS 10.14.3, iOS 12.1, and below negotiated TLS 1.2 as the highest protocol version. Every modern iPhone, iPad, and Mac running a current Safari uses TLS 1.3 when the server allows it.
Opera supports TLS 1.3 from Opera 57 on Windows, macOS, Linux, and Android, since Opera tracks the Chromium engine. Opera 54 to 56 had TLS 1.3 disabled by default behind a flag. Opera Mobile supports TLS 1.3 from Opera Mobile 80 on Android.
Samsung Internet supports TLS 1.3 from Samsung Internet 10.1 on Galaxy phones and tablets, since the browser tracks Chromium. Samsung Internet 4.0 to 10.0 negotiated TLS 1.2 as the highest protocol version. The protocol is on by default, so users do not need to flip a setting in the Samsung Internet app.
Chrome for Android supports TLS 1.3 from Chrome 70, so any current Android device using the modern Chrome WebView negotiates TLS 1.3 automatically. The legacy stock Android Browser based on the older WebView 2 to 4 codebase never added TLS 1.3. Move WebView-based apps to a current Android System WebView for the protocol.
Internet Explorer never added TLS 1.3 in any version. IE 11 negotiates TLS 1.2 as its highest protocol version, and Microsoft has retired the browser. Move TLS 1.3 sensitive workflows to Chromium-based Edge or Chrome for any new work.
Note: TLS 1.3 negotiation breaks behind corporate proxies, on legacy IE 11, and through some captive portals. Test it on real browsers and OS with TestMu AI. Try TestMu AI free!
TLS 1.3 cuts the handshake to one round trip, drops insecure ciphers, encrypts most handshake messages, and makes forward secrecy mandatory.
TLS 1.3 differs from TLS 1.2 on the handshake, the cipher suite list, the forward secrecy guarantee, and the encryption of handshake messages. The table below shows where the two versions diverge.
| Dimension | TLS 1.2 | TLS 1.3 |
|---|---|---|
| RFC | RFC 5246 | RFC 8446 |
| Handshake round trips | 2 round trips | 1 round trip, or 0 with resumption |
| Cipher suites | 37+ negotiable, including legacy ciphers | 5 AEAD-only suites |
| Forward secrecy | Optional, RSA key exchange permitted | Mandatory, ephemeral Diffie-Hellman only |
| Insecure algorithms | RC4, MD5, SHA-1, CBC-mode permitted | All removed |
| Encrypted handshake | Plaintext after ServerHello | Encrypted after ServerHello |
| 0-RTT resumption | Not supported | Supported, with replay caveat |
| Browser support | Universal across all modern browsers | All modern browsers, no IE 11 |
TLS 1.3 is on by default in every modern browser. You only flip a flag if your IT team disabled the protocol, or you are running an old Firefox or Chrome build that shipped a draft version.
If the connection still uses TLS 1.2 after the relaunch, a corporate proxy, firewall, or antivirus product is forcing the downgrade. Whitelist the site or disable TLS interception on the test machine.
// Paste this snippet into the DevTools console of any modern browser to confirm TLS 1.3.
// The check uses the Network panel of DevTools because the JS Security API does not
// expose the negotiated TLS version directly.
console.log("Open the DevTools Security tab and reload the page.");
console.log("Look for: 'Connection - secure connection settings: TLS 1.3'.");
// Programmatic alternative: inspect performance entries for the main document.
const nav = performance.getEntriesByType("navigation")[0];
if (nav && nav.nextHopProtocol) {
console.log("Next-hop protocol:", nav.nextHopProtocol);
} else {
console.log("Performance Navigation Timing is unavailable in this context.");
}TLS 1.3 ships in every modern browser, but middleboxes, legacy IE 11 traffic, and 0-RTT replays still cause real-world friction.
In my experience, the middlebox issue is the most common reason a TLS 1.3-capable browser still negotiates TLS 1.2 on a corporate network. The fix is rarely on the browser side: ask your IT team to whitelist the destination or disable TLS interception for development domains.
All TLS 1.3 version numbers and platform notes in this guide come from these primary sources:
Did you find this page helpful?
More Related Hubs
TestMu AI forEnterprise
Get access to solutions built on Enterprise
grade security, privacy, & compliance