Slashdot | How Would Crypto Back Doors Work?
keyser-soze at hushmail.com
keyser-soze at hushmail.com
Thu Sep 20 13:44:12 PDT 2001
One of the easiest, most effective and difficult to detect back doors is to compromise the PRNG.
More information about the cypherpunks-legacy
mailing list