Slashdot | How Would Crypto Back Doors Work?

keyser-soze at hushmail.com keyser-soze at hushmail.com
Thu Sep 20 13:44:12 PDT 2001


One of the easiest, most effective and difficult to detect back doors is to compromise the PRNG.





More information about the cypherpunks-legacy mailing list