| http://www.w3.org/ns/prov#value | - In all cases, a weak key would allow an eavesdropper on the network to learn confidential information, such as passwords or the content of messages, exchanged with a vulnerable server, said the EFF's Dan Auerbach, a staff technologist, and Peter Eckersley, technology projects director, in a blog post.
|