I'd like to have a look at the Lenova/Superfish root certificate being used in the wild. Can someone provide it, or a textual output of it with:
cat superfish.cert | openssl x509 -text -noout
I've worked through articles like Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections, and looked at similar questions like How to detect if I am vulnerable to “Superfish”, and how to remove it? and What security risks are posed by software vendors deploying SSL Intercepting proxies on user desktops (e.g. Superfish).
Aucun commentaire:
Enregistrer un commentaire