certificate cleanliness sha1rightlol [was Re: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program]
On 12/9/15, coderman <coderman@gmail.com> wrote:
On Tue, Dec 8, 2015 at 8:53 AM, grarpamp <grarpamp@gmail.com> wrote:
... Well it was an "F" grade so either it's fixed now or someone was jacking it along the way.
sir, my military grade crypto is NSA-proof forever and ever, amen.
;P
speaking of form whom it tolls, "TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384" is better than https://peertech.org/files/wtfgmailtls10dec2015.png :o . . . [ ... ? :) ] best regards,
SHA1 & MD5 are still 'fine' to use as MAC, not fine to use in digital signatures (like, X.509.) (Because collisions attacks don't make sense for MACs brueh.) -Travis On Thu, Dec 10, 2015, 7:14 AM coderman <coderman@gmail.com> wrote:
On 12/9/15, coderman <coderman@gmail.com> wrote:
On Tue, Dec 8, 2015 at 8:53 AM, grarpamp <grarpamp@gmail.com> wrote:
... Well it was an "F" grade so either it's fixed now or someone was jacking it along the way.
sir, my military grade crypto is NSA-proof forever and ever, amen.
;P
speaking of form whom it tolls, "TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384" is better than https://peertech.org/files/wtfgmailtls10dec2015.png :o
. . .
[ ... ? :) ]
best regards,
On 12/10/15, Travis Biehn <tbiehn@gmail.com> wrote:
SHA1 & MD5 are still 'fine' to use as MAC, not fine to use in digital signatures (like, X.509.) (Because collisions attacks don't make sense for MACs brueh.)
very true! though i was mostly mocking the sha1 CA root and "Trusted: NO, there were errors: The certificate authority's certificate is invalid." ... :) best regards,
participants (2)
-
coderman
-
Travis Biehn