Remove FOIA Remove Libraries Remove Metadata
article thumbnail

CSRB Report on Microsoft

Adam Shostack

My suspicion is amplified by Figure 1 saying The various authentication libraries use the metadata endpoint to determine valid signing keys. ] [The victim notification email in Figure 2 is anodyne and wordy, and were well into the second paragraph before we get to government-backed actors.

Cloud 52