Certifiably vulnerable: Using Certificate Transparency logs for target reconnaissance
Guest Post: Large-scale measurement study identifies potential threats of Certificate Transparency logs.
Guest Post: Large-scale measurement study identifies potential threats of Certificate Transparency logs.