summaryrefslogtreecommitdiff
path: root/blog/2024-09-06-Keyhole/index.md
diff options
context:
space:
mode:
authorMay2026-04-08 18:56:22 +0000
committerMay2026-04-08 19:00:15 +0000
commite609eaf5c38f5985aaa76d69f243cadb560ccb67 (patch)
treefbc08a00028b92de823356a64cbb7d82bc6611e5 /blog/2024-09-06-Keyhole/index.md
parente437e4bf422b610ed924412e99563f6864cc9183 (diff)
downloadmassgrave.dev-e609eaf5c38f5985aaa76d69f243cadb560ccb67.zip
update docusaurusHEADmain
Diffstat (limited to 'blog/2024-09-06-Keyhole/index.md')
-rw-r--r--blog/2024-09-06-Keyhole/index.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/blog/2024-09-06-Keyhole/index.md b/blog/2024-09-06-Keyhole/index.md
index 234dc4f..ecfeb0c 100644
--- a/blog/2024-09-06-Keyhole/index.md
+++ b/blog/2024-09-06-Keyhole/index.md
@@ -19,7 +19,7 @@ In our ongoing work to bypass Windows licensing checks, we occasionally stumble
One such discovery, which we've named "Keyhole", turned out to be a highly effective DRM bypass. It gave users the ability to license any Microsoft Store app or any modern Windows edition with ease.
-<!-- truncate -->
+{/* truncate */}
Following the disclosure of [CVE-2024-38184](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38184) by [Cisco TALOS](https://talosintelligence.com), we have decided to share our findings on Keyhole, which we independently uncovered around the same time it was reported to Microsoft.