In this case, the certificate has not been verified by a third party that your computer trusts. Anyone can create a certificate claiming to be whatever website they choose, which is why it must be verified by a trusted third party. Without that verification, the identity information in the certificate is meaningless. It is therefore not possible to verify that you are communicating with <strong>$1</strong> instead of an attacker who generated his own certificate claiming to be <strong>$2</strong>. You should not proceed past this point.