Hacker News new | past | comments | ask | show | jobs | submit login

No, no, no. This is a different exploit. We don't know how he did it yet. (He did get the private key mathematically, using the method from the talk, but not using the revocation list exploit)



Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: