Remix.run Logo
woodruffw a day ago

Did you read it? There are multiple examples of claimed exploitation right below the section I linked.

ferngodfather a day ago | parent [-]

Which bit says about stealing a certificate/keys and MITMing traffic with the stolen keys - with real world ramifications?