Hacker News new | past | comments | ask | show | jobs | submit login

> That doesn't particularly matter; if someone takes over the ___domain but doesn't have a leaked key, they can't sign requests for the ___domain with my cert. It takes a leaked key for this to turn into a vulnerability.

It does, if someone gets temporary access, issues a certificate and then keeps using it to impersonate something. Now the malicious actor has to do it much more often, significantly increasing chances of detection.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: