One of the giveaway requirements is sharing the video, so here we are! This would be an awesome daily driver around town.
I See What “We” Did Here
I See What You Did There
SSLv3 is older than my daughter, but is still supported by all major browsers. The latest crypto bug is a MITM (man in the middle) attack that could allow anyone with a network device (WiFi router) sitting between browser users and the destination SSLv3 server (https “secure” bank site, for instance) to snoop on the connection in plain text.
Links:
SSLv3 server stats and steps to fix your browser
POODLE attack details
#POODLE on twitter
I Can See Your Heart
Nothing to See Here
Following Apple’s SSL patch (in which they said to switch to TLS), GNUTLS patched a similar bypass of certificate checking..
via: Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping