These links give some information on the kind of devices that are vulnerable.
https://www.eff.org/deeplinks/2012/02/researchers-ssl-observatory-cryptographic-vulnerabilities
https://freedom-to-t
Forum: 2012 Reports
I presented on these ideas at Certicom's Public Key Solutions 1999 conference on a paper "ECC, Future Resiliency and High Security Systems". This may help explain the "folklore" comment in the paper.
Forum: 2012 Reports