I don't like how he says the key was "cracked."<p>The key was sitting there in the binary in plaintext. Any college student with a few years of Unix tools under his belt could have done it in an hour.<p>That's how horrible this tool was. Anyone who noticed this months ago could have been using this key to MITM people.
Awful title, but the first article I've found (and I tried googling) that actually summarizes what the heck is going on from the ground up. Thanks for posting.