logoalt Hacker News

sagacityyesterday at 4:49 PM0 repliesview on HN

This is probably based on the research outlined in this ccc presentation: https://youtu.be/cVJZYT8kYsI

This also goes into a bit more detail regarding how these keys are used.