Hacker Newsnew | past | comments | ask | show | jobs | submitlogin



Isn't the software that generated the key derivable from the key itself? Even if it doesn't tag the key explicitly, there's probably a fingerprint in the default allowed algorithms etc.

If it's a fixed vulnerability, the keys would belong to a certain date range etc.

Will be interesting to see what turns up.


This paper points to OpenSSL with low entropy RNG being the culprit: https://freedom-to-tinker.com/blog/nadiah/new-research-there...





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: