Every time we have these backdoor discussions, people say “we basically know how to build secure systems,” like it’s just a matter of willpower or something. The truth is we don’t know how to build our existing systems securely at all.
-
-
Prikaži ovu nit
-
And no, this isn’t just a question of “knowing a little crypto” and “knowing a lot about secure software”, because the weird crypto bugs are the ones Microsoft needs the NSA to find.
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
-
-
Serious question: at what point did anyone think it was a good idea for X.509 to include support for arbitrary, custom EC parameters?
-
I think(?) the idea was that if we wanted to add more EC curves at a later date we could, without needing to add new constants or new fields. The problem of course is that implementations just accepted any arbitrary values.
- Još 4 druga odgovora
Novi razgovor -
-
-
Ok but how do we know someone didn’t pay or infiltrate the A team to intentionally add that behavior?
-
Is that excluded from the crypto backdoors threat model?
- Još 1 odgovor
Novi razgovor -
-
-
Seems like a valuable exploit for them, so what motivated the release? Could it be that another threat actor had found it too, and started to use it against US targets. (Pure speculation on my part, to be clear!)
- Još 1 odgovor
Novi razgovor -
-
-
Interestingly enough, noted similarly re net consequencehttps://twitter.com/daniel_bilar/status/1156206275333697536 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
What a
#CENNZ-ible visualization!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.