Hey, Crypto by groundhog! In "OpenSSL address implementation, the hard coded 1024 bit DH p parameter was not prime". http://arstechnica.com/security/2016/02/crypto-flaw-was-so-glaring-it-may-be-intentional-eavesdropping-backdoor/ …
-
-
@zeynep Still not quite as bad as Debian's colossal non-random number generator goof (called a blunder at the time): https://www.debian.org/security/2008/dsa-1571 …Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.