It’s no secret that the Google-owned web services company has been heavily involved in cracking popular SSL-based websites, and now the company has cracked two more.
In an interview with TechCrunch, CloudFlARE founder Matthew Prince said the company “busted” a Google-controlled SSL certificate for an unsecured web server, and the company was working on cracking another.
CloudFlAR’s Matt Prince told TechCrunch that the company is currently working on a new SSL certificate, which was cracked by Google earlier this year.
In response to questions from TechCrunch about the new SSL certificates, CloudflARE said in a statement:The new certificate was obtained through a vulnerability in an old version of the CloudFlares SSL certificates issued by Google in April 2017.
The certificate was updated in late July 2017 to fix a problem with the old version that was previously disclosed publicly.
Cloudflares team has been working on implementing these security updates for several months now, and it’s a large step in the right direction, said Prince.
CloudFlare has been one of the companies that has been among the most vocal in decrying the NSA’s efforts to crack SSL.
In October, Google’s security researcher, Brian Krebs, claimed that the NSA had breached the company’s security, as well as several other SSL providers, including Google.
Earlier this month, the company said that it was working with the FBI on a possible “hack” of Google’s servers.
It also released a statement saying that it had found that “there is no way that the SSL certificates used in these attacks are valid.”
In the past, CloudFLARE has been particularly critical of Google, which has come under fire for the way it handles its SSL certificate process.
The company has publicly questioned Google’s ability to handle the millions of requests it receives for certificates, as it has been slow to respond to requests from the NSA, and has suggested that it may be able to use its own servers to provide HTTPS services for its customers.