@AndreaBarisani @cynicalsecurity The goal isn't to just wipe the key, it's to destroy all knowledge of the algorithm.
-
-
-
@azonenberg@cynicalsecurity non public crypto algorithms...because that works right? :) protect the key, not the algo -
@AndreaBarisani@cynicalsecurity If you're an intel agency you have the cryptographers in house to design something good w/o public review -
@AndreaBarisani@cynicalsecurity (unlike most small SW firms etc). At this point keeping the alg secret is a valid defense in depth practice -
@azonenberg@cynicalsecurity we all know from history how pointless and flawed "secret" and not peer reviewed crypto algos can be, cmon...
End of conversation
New conversation -
-
-
@AndreaBarisani Different op parameters. This is for the military use. Please see incident 2001 Hainan USN EP-3https://twitter.com/daniel_bilar/statuses/405474315413368832?tw_i=405474315413368832&tw_e=permalink&tw_p=archive …Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.