I've seen some conflicting messages about whether or not a patched AP fixes a vulnerable client; anyone know for sure? CC: @SwiftOnSecurity
I suspect it might be workaroundable in the AP? Refusing to ever rexmit Msg3 but instead resetting back to Msg1?
-
-
The bug is stupid key/nonce reuse but the fixes/workarounds for existing designs are subtle I'd say. We need more people to take a hard look
- End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.