woodruffw 1 day ago

Did you read it? There are multiple examples of claimed exploitation right below the section I linked.

1
ferngodfather 1 day ago

Which bit says about stealing a certificate/keys and MITMing traffic with the stolen keys - with real world ramifications?