On Tue, Feb 27, 2018 at 12:09:01AM +0100, Jakob Bohm via dev-security-policy 
wrote:
> 
> Hence why an investigation is needed by the 3 CAs named in the paper
> (Comodo, Digicert and Apple).  They will probably have to do some deep
> log inspection to figure out patterns, besides reaching out to the
> researcher to see the raw data in confidence.

I've just tried to contact the author and hope to provide the CAs
with details.


Kurt

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to