Arthur Besse@lemmy.ml to Technology@lemmy.mlEnglish · 1 month agoNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?blog.cr.yp.toexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down11cross-posted to: pulse_of_truth@infosec.pubcrypto@infosec.pubtechnology@lemmy.zipcryptography@lemmy.mlhackernews@lemmy.bestiver.se
arrow-up15arrow-down1external-linkNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?blog.cr.yp.toArthur Besse@lemmy.ml to Technology@lemmy.mlEnglish · 1 month agomessage-square0linkfedilinkcross-posted to: pulse_of_truth@infosec.pubcrypto@infosec.pubtechnology@lemmy.zipcryptography@lemmy.mlhackernews@lemmy.bestiver.se