Rogue WHOIS server gives researcher superpowers no one should ever have
Aurich Lawson | Getty Images It’s not every day that a security researcher acquires the ability to generate counterfeit HTTPS certificates, track email activity, and execute code of his choice on thousands of servers—all in…