A bit off topic, but interesting discussion of extracting keys from a
chip using power analysis.
http://www.h-online.com/security/news/item/Backdoor-found-in-popular-FPGA-chip-1585579.html
...
The researchers located the JTAG (Joint Test Action Group) interface
on the FPGA, used for programming t
On Mon, Jun 04, 2012 at 10:20:33AM +0200, Erwann Abalea wrote:
> It's also not clear about what could have been done with TS certificates.
> Is it only codesigning, or TLS server as well?
I'm surprised they can be used for code signing at all. TS (in its modern
incarnation) is a TLS-encapsulated
It's also not clear about what could have been done with TS certificates.
Is it only codesigning, or TLS server as well?
--
Erwann.
Le 4 juin 2012 09:57, "Marsh Ray" a écrit :
>
> In case its not clear from the filenames (e.g. the email system drops
them) there were three certs revoked. These a
On 06/04/2012 02:41 AM, Marsh Ray wrote:
I've attached the revoked sub-CAs and their roots.
In case its not clear from the filenames (e.g. the email system drops
them) there were three certs revoked. These are the ones with
"Licensing" in the CN.
For convenience I also included the two roo
I'm sure many readers of the list will have heard by now, some Microsoft
sub-CAs were used for signing malware.
For the record here's an excerpt from the MS release and to save
interested people time I've attached the revoked sub-CAs and their roots.
There is some tantalizing bits about MD5