1. 2
  1.  

  2. 2

    Cyber criminals and hackers are interested in abusing digital certificates to conduct illicit activities like cyber espionage, sabotage or malware diffusion.

    1. 2

      Seems we are heading to point 0 in this case where the certificates will have to be re-evaluated.