In general, the name of the server you're talking to has leaked ("stackoverflow.com"). This probably happened via DNS before SSL / TLS could start the connection.
Server certificate leaked. Any client certificate that you sent (not a general configuration) may or may not be sent for clarity. An active attacker (man-in-the-middle) might just ask for your browser and get it anyway.
Part of the URL path ("/ questions / 2146863 / how-much-data-is -aked-from-ssl-connection") should NOT be skipped. It is transmitted encrypted and secure (provided that the client and server are configured correctly and you have not missed any certificate errors).
Another poster is true that traffic attacks are possible that can bring out some things about static content. If the site is very large and dynamic (say, stackoverflow.com), I suspect that it can be quite difficult to get a lot of useful information from it. However, if there are only a few files with distinctive sizes, the download of which may be obvious.
POST form data must NOT be skipped. Although the usual warnings apply if you pass objects of known sizes.
Temporary attacks may reveal some information. For example, an attacker can strike at various parts of the application (for example, a specific database table) or preload some static files from disk and see how your connection slows down or speeds up in response.
This is leak information, but probably not a big deal for most sites.
source share