Of course, they aren't admitting to it publicly. The question is how many countries, companies, and other users of Infineon chips are quietly sweeping ROCA under the rug and ignoring the fact that their security is now *utterly broken* until updated?https://twitter.com/marcan42/status/928171103607865345 …
-
Show this thread
-
Replying to @marcan42
As long as they’re working hard to find out which ones are affected and replacing them now, I’m fine with no communication until done.
1 reply 0 retweets 0 likes -
Replying to @SwissHttp
So you're fine with them leaving all their users vulnerable to complete and utter impersonation until they manage to deploy a fix? The vulnerabiilty is public *today*, hackers don't wait until you're done with logistics.
1 reply 0 retweets 0 likes -
Replying to @marcan42
I’m not fine with doing nothing. It’s just that communication probably won’t change much. How are these NFC features used?
1 reply 0 retweets 0 likes -
Replying to @SwissHttp
The NFC features are tangential; what matters is that signatures made with these ID cards (I/O method doesn't matter) have *complete legal equivalence* to written signatures, and this is used by many companies and government institutions.
1 reply 0 retweets 0 likes -
Replying to @marcan42 @SwissHttp
Literally, we're in a window where anyone in Spain who owns one of these cards and has ever used it (certificates with a factorable modulus exist) can have their electronic identity completely and utterly stolen.
1 reply 0 retweets 0 likes -
Replying to @marcan42
I’m just asking which part you can avoid by communication to everyone. If there is something where it helps, then yes, do it.
1 reply 0 retweets 0 likes -
Replying to @SwissHttp
The point of communicating to everyone is *informing* that the system is broken and that it should not be trusted. The bad guys already know. The good guys need to know. It means things like not accepting e-signed docs without further checks.
3 replies 0 retweets 0 likes -
Replying to @marcan42
If there are systems accepting bad keys, they should be informed by now. For users accepting docs, agreed, there it would help.
1 reply 0 retweets 0 likes -
Replying to @SwissHttp
There is a CRL. There is a way of getting every on-line system to stop accepting these certs. But they aren't using it. Why aren't these certs in the CRL already?
2 replies 0 retweets 0 likes
As for e-signing, yes. Basically Spanish eID can be used by *anyone* to validate the identity of Spanish citizens and for accepting signatures with legal validity. It's an open x.509 based system. Companies are encouraged to use it.
-
-
Replying to @marcan42 @SwissHttp
For example, I can set up my bank account to allow logging in via DNIe.
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.