← Back to context

Comment by tptacek

1 day ago

The threat model of the attack is targets relying on binary/source transparency of open source clients to protect against (state-sponsored) client backdoors; in that sense, it most closely resembles the Juniper/NetScreen Dual-EC attack, which functioned basically the same way: a backdoor that was essentially not auditable, as the underlying vulnerability was realized cryptographically.

I'm just clarifying. I agree the practical implications of the attack are not really meaningful to a general audience.