|
@DAlperovitch | |||||
|
This is helpful: media.defense.gov/2020/Jan/14/20…
|
||||||
|
||||||
|
MalwareTech
@MalwareTechBlog
|
14. sij |
|
Deleted the tweet about the crypto bug because there's conflicting info on its scope. Some people are tweeting at me saying it's viable for TLS interception, but MS Security Portal only mentions file signature spoofing. Going to go do some digging.
|
||
|
|
||
|
Heather Adkins
@argvee
|
14. sij |
|
From the portal advisory: "A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software."
|
||
|
|
||
|
Tavis Ormandy
@taviso
|
14. sij |
|
It is weird that the official advisory is so focussed on code signing.
|
||
|
|
||
|
Acebond
@aceb0nd
|
14. sij |
|
The real question is, did the NSA get a bug bounty?
|
||
|
|
||
|
Karl Mueller byeShmoo!
@infosecspy
|
14. sij |
|
Hmmmmmm I wonder why the nsa know so much about ecc especially with respect to what primes and base to use 🤔
|
||
|
|
||