Update 6/10: Based on a short conversation with an engineering lead at X, some of the devices used at X are claimed to be using HSMs. See below. Matthew Garrett has a nice post about Twitter (uh, X…
seriously, that’s the most convoluted wording possible for a simple statement. If they have the private keys they have the private keys and there’s no need for analysis.
That’s not “probably”. If they have the key they straight up have access. The key to my house can’t just probably unlock the door.
seriously, that’s the most convoluted wording possible for a simple statement. If they have the private keys they have the private keys and there’s no need for analysis.
Weird, I didn’t see ‘probably’ once in your reply.