Comment by sagacity
6 days ago
This is probably based on the research outlined in this ccc presentation: https://youtu.be/cVJZYT8kYsI
This also goes into a bit more detail regarding how these keys are used.
6 days ago
This is probably based on the research outlined in this ccc presentation: https://youtu.be/cVJZYT8kYsI
This also goes into a bit more detail regarding how these keys are used.
No comments yet
Contribute on Hacker News ↗