A discussion of Public Key Infrastructure (PKI) in the context of SHA-1 certificate hash vulnerabilities.
Original date of publication: 2017-03-15