Fraudulent *.google.com certificate issued
Fraudulent *.google.com certificate issued
Posted Sep 1, 2011 20:35 UTC (Thu) by Comet (subscriber, #11646)In reply to: Fraudulent *.google.com certificate issued by nix
Parent article: Fraudulent *.google.com certificate issued
Stupid, but the screenshots were also showing plain text, so there's also a slim chance that there wasn't even a cookie-stealing attack made possible by this. Just bragging rights in getting plaintext up under an available name of your choice.
Stupid CMS for some web content is a long way from breach of the signing systems. If your news source is a company which sells security services, then hyperbolic claims on their part in talking up the implications of what they found is to be expected.
I'd hope that technical decisions about trust are based on more than panicked responses by non-technical decision makers to hyperbole they take at face value because they don't understand the issues.
So I'm assuming that there's yet more to this story that hasn't come out yet.
Posted Sep 6, 2011 19:52 UTC (Tue)
by Comet (subscriber, #11646)
[Link] (1 responses)
https://blog.torproject.org/blog/diginotar-damage-disclosure
Excuse me while I cry into a drink.
Posted Sep 6, 2011 20:38 UTC (Tue)
by nix (subscriber, #2304)
[Link]
Fraudulent *.google.com certificate issued
Fraudulent *.google.com certificate issued