cm0002@sh.itjust.works to Technology@lemmy.zipEnglish · 19 hours agoNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?blog.cr.yp.toexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10cross-posted to: technology@lemmy.ml
arrow-up17arrow-down1external-linkNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?blog.cr.yp.tocm0002@sh.itjust.works to Technology@lemmy.zipEnglish · 19 hours agomessage-square0linkfedilinkcross-posted to: technology@lemmy.ml