Kaspersky identified SSL certificates by a 32bit fingerprint (!!!), making it trivial for MITM to create collisions. https://bugs.chromium.org/p/project-zero/issues/detail?id=978 …
-
-
Replying to @taviso
Nice find, glad they fixed it. But screenshot suggests would create SSL false positives, not false negatives right?
2 replies 0 retweets 0 likes -
Replying to @martijn_grooten @taviso
Oh, wait, I take it that's because Kaspersky also checks the "commonName" as you added today?
1 reply 0 retweets 0 likes -
Replying to @martijn_grooten
No, I don't think that's related to your question.
1 reply 0 retweets 0 likes -
Replying to @taviso
Thanks, get it now. Was just confused by the screenshot which shows incorrectly blocked site rather than incorrectly accepted one.
1 reply 0 retweets 0 likes
Replying to @martijn_grooten
Ahh, yep. I posted it mainly because I was confused why users haven't reported it as random unexplained error...
12:25 PM - 3 Jan 2017
0 replies
0 retweets
2 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.