Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Security Vulnerabilities in Certificate Pinning (schneier.com)
5 points by lilyball on Dec 8, 2017 | hide | past | favorite | 1 comment


From the paper, it appears that Spinner works by using censys.io to search for other websites that have the same certificate chain as the target domain (only differing in the leaf certificate), then redirects the app in question to that alternative website. It then analyzes the encrypted network traffic to see if the app completes the SSL handshake or if it bails while establishing. If it completes the SSL handshake then it must not have performed hostname verification.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: