Of course, they aren't admitting to it publicly. The question is how many countries, companies, and other users of Infineon chips are quietly sweeping ROCA under the rug and ignoring the fact that their security is now *utterly broken* until updated?https://twitter.com/marcan42/status/928171103607865345 …
For comparison, SSL CAs are required to revoke ROCA-vulnerable certs within 24h of being made aware of their existence (and are expected to proactively check everything they've issued for the ROCA fingerprint).
-
-
The *right* way to do this would've been to develop a fix in the, oh, 6 months Infineon had to get critical customers on board, then at public disclosure revoke all remaining certs and say "sorry, visit an eID kiosk and renew your certs/update your firmware".
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.