Hey all you "never do cryptography yourself" people, here's _yet more_ proof you've been wrong the whole time: http://www.reuters.com/article/2014/03/31/us-usa-security-nsa-rsa-idUSBREA2U0TY20140331?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637 …
-
-
Replying to @kittenm4ster
@andmatand@dotstdy@Jonathan_Blow You can't say "experts say", and then object to an ad hominem. My point is he's not a good expert.1 reply 0 retweets 0 likes -
Replying to @cmuratori
@andmatand@dotstdy@Jonathan_Blow But the refutation in general is simple: we now know that many standard components have been compromised.1 reply 0 retweets 0 likes -
Replying to @cmuratori
@andmatand@dotstdy@Jonathan_Blow So his idea of "reusing secure components" is a non-starter: you don't know which components are secure!1 reply 0 retweets 0 likes -
Replying to @cmuratori
@andmatand@dotstdy@Jonathan_Blow And if you have the capability to _verify_ that they are secure, you have the capability to write them.1 reply 0 retweets 0 likes -
Replying to @cmuratori
@andmatand@dotstdy@Jonathan_Blow And be reusing you actually multiply the cost of failure. You are concentrating the damage.1 reply 0 retweets 0 likes -
Replying to @cmuratori
@andmatand@dotstdy@Jonathan_Blow At the limit, Bruce's advice means that we all use one thing. When it fails, everything fails. At once.1 reply 0 retweets 0 likes
@andmatand @dotstdy @Jonathan_Blow How is that a good outcome? Many independent implementations is a form of fault tolerance.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.