Detecting anomalies with TLS fingerprints could pinpoint supply chain compromises
Researchers at Splunk outline a technique leveraging the JA3 standard, pioneered by Salesforce, that could detect malicious activity in the software supply chain, but with some limitations.