It would be nice to organize an effort to collect as many public keys as possible and run them through the Infineon weak key detector.
I guess breaking those keys would be less damaging due to timestamping? Though I'm not sure how all the codesigning stuff really works.
-
-
Authenticode timestamping is similar to OCSP stapling: CA signs a message stating that the cert was valid for that EXE hash at that time.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.