Comsec Dream
rysiek
rysiek at hackerspace.pl
Sat Jan 17 02:35:33 PST 2015
Dnia czwartek, 15 stycznia 2015 20:02:21 Travis Biehn pisze:
> The distinction is crypto is applied. The axioms and rules don't require
> belief or faith - applied crypto has shown time and time again to require
> belief and faith.
>
> Crypto is opaque - but open.
>
> DES was once thought to be secure.
> RSA was once thought to be secure.
> PKI was once thought to be secure.
Secure to protect what and from whom?
The threat model changes.
--
Pozdrawiam,
Michał "rysiek" Woźniak
Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 931 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20150117/fd3483db/attachment-0001.sig>
More information about the cypherpunks
mailing list