From e609eaf5c38f5985aaa76d69f243cadb560ccb67 Mon Sep 17 00:00:00 2001 From: May Date: Wed, 8 Apr 2026 18:56:22 +0000 Subject: update docusaurus --- blog/2024-09-06-Keyhole/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'blog/2024-09-06-Keyhole') diff --git a/blog/2024-09-06-Keyhole/index.md b/blog/2024-09-06-Keyhole/index.md index 234dc4f..ecfeb0c 100644 --- a/blog/2024-09-06-Keyhole/index.md +++ b/blog/2024-09-06-Keyhole/index.md @@ -19,7 +19,7 @@ In our ongoing work to bypass Windows licensing checks, we occasionally stumble One such discovery, which we've named "Keyhole", turned out to be a highly effective DRM bypass. It gave users the ability to license any Microsoft Store app or any modern Windows edition with ease. - +{/* truncate */} Following the disclosure of [CVE-2024-38184](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38184) by [Cisco TALOS](https://talosintelligence.com), we have decided to share our findings on Keyhole, which we independently uncovered around the same time it was reported to Microsoft. -- cgit v1.2.3