You must log in or # to comment.
Oh wow. TL;DR They found out that, if you can do mitm on a TLS connection with valid certificates, you can impersonate the TLS secured service! I don’t get from the article what the novelty is.
Oh wow. TL;DR They found out that, if you can do mitm on a TLS connection with valid certificates, you can impersonate the TLS secured service! I don’t get from the article what the novelty is.