"Most of them are found in embedded networked devices, such as routers and firewalls."
"it would be a colossal fluke to see even one duplicated RSA prime, and finding 64,000 of them is clear evidence that those primes are not being chosen uniformly at random"
"cryptographic keys are being generated immediately after a machine is booted, when it just can’t scrape together enough entropy to make a passable pseudorandom number"
http://bit-player.org/2013/the-keys-to-the-keydom
"64,081 compromised keys for TLS hosts"
"Most of them are found in embedded networked devices, such as routers and firewalls."
"it would be a colossal fluke to see even one duplicated RSA prime, and finding 64,000 of them is clear evidence that those primes are not being chosen uniformly at random"
"cryptographic keys are being generated immediately after a machine is booted, when it just can’t scrape together enough entropy to make a passable pseudorandom number"