Update 6/10: Based on a short conversation with an engineering lead at X, some of the devices used at X are claimed to be using HSMs. See more further below. Matthew Garrett has a nice post about T…
seriously, that’s the most convoluted wording possible for a simple statement. If they have the private keys they have the private keys and there’s no need for analysis.
That’s not “probably”. If they have the key they straight up have access. The key to my house can’t just probably unlock the door.
seriously, that’s the most convoluted wording possible for a simple statement. If they have the private keys they have the private keys and there’s no need for analysis.
Weird, I didn’t see ‘probably’ once in your reply.