The vulnerability in question: *The Return of Coppersmith’s Attack:
Practical Factorization of Widely Used RSA Moduli∗ <a href="https://crocs.fi.muni.cz/_media/public/papers/nemec_roca_ccs17_preprint.pdf" rel="nofollow">https://crocs.fi.muni.cz/_media/public/papers/nemec_roca_ccs...</a><p>Estonian ID card uses 2048 byte keys which means generating a private key from a public key takes 140.8 CPU years which is quite fast/trivial/cheap using a distributed approach (botnet, your already existing HW that you use for mining etc).. considering the implications.<p><a href="https://www.schneier.com/blog/archives/2017/09/security_flaw_i.html" rel="nofollow">https://www.schneier.com/blog/archives/2017/09/security_flaw...</a>