Hacker News new | past | comments | ask | show | jobs | submit login

Not at all. Given the history of TLS implementations, I would call "There are exploitable vulnerabilities" the null hypothesis, and require extraordinary proof that a particular TLS implementation doesn't have vulnerabilities.



Perhaps, but this is an academic security researcher we are talking about. To generalise massively, academics are very deliberate and conservative in their language.

If he wasn't aware of at least one unreported exploitable vulnerability then I would expect him to say "There are almost certainly still other, unreported vulnerabilities".


I don't think the crypto engineering blog is where Prof. Green publishes his very conservative academic writing. It's a blog, not a refereed paper.


His academic communication mostly happens on Twitter.


As an academic, he has probably verified that the underlying algorithms are as sound as claimed. Problems like Heartbleed come from implementation errors. Implementations are very prone to error, so there are almost certainly still other, unreported vulnerabilities.

From the article, it would seem that side-stepping this, and going directly for the routers, or even the employees, is more efficient in actually circumventing encryption than hunting for vulnerabilities in encryption implementations.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: