pointless stunt, there are several ways to destroy keys or brick processors that do not require physical destructionhttps://twitter.com/daniel_bilar/status/642341880680812544 …
-
-
Replying to @AndreaBarisani
@AndreaBarisani@cynicalsecurity The goal isn't to just wipe the key, it's to destroy all knowledge of the algorithm.2 replies 0 retweets 2 likes -
Replying to @azonenberg
@azonenberg@cynicalsecurity non public crypto algorithms...because that works right? :) protect the key, not the algo1 reply 0 retweets 0 likes -
Replying to @AndreaBarisani
@AndreaBarisani@cynicalsecurity If you're an intel agency you have the cryptographers in house to design something good w/o public review2 replies 0 retweets 0 likes -
Replying to @azonenberg
@AndreaBarisani@cynicalsecurity (unlike most small SW firms etc). At this point keeping the alg secret is a valid defense in depth practice2 replies 0 retweets 0 likes
@azonenberg @cynicalsecurity we all know from history how pointless and flawed "secret" and not peer reviewed crypto algos can be, cmon...
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.