Burning an exploit protects infrastructure for the six weeks it takes to develop another. Then what? Look farther.https://twitter.com/chort0/status/679799339015770113 …
-
-
Replying to @Snowden
@Snowden@durumcrustulum We’re not talking about exploits. We’re talking about cryptographic backdoors.4 replies 4 retweets 4 likes
@tqbf It works like this: 1) NSA encourages credulous partners to adopt Dual-EC via NCSC (https://www.nsa.gov/business/programs/ncsc.shtml …). Some do. Some weak.
7:57 AM - 24 Dec 2015
0 replies
32 retweets
41 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.