Comsec Dream

rysiek rysiek at hackerspace.pl
Sat Jan 17 02:35:33 PST 2015


Dnia czwartek, 15 stycznia 2015 20:02:21 Travis Biehn pisze:
> The distinction is crypto is applied. The axioms and rules don't require
> belief or faith - applied crypto has shown time and time again to require
> belief and faith.
> 
> Crypto is opaque - but open.
> 
> DES was once thought to be secure.
> RSA was once thought to be secure.
> PKI was once thought to be secure.

Secure to protect what and from whom?

The threat model changes.

-- 
Pozdrawiam,
Michał "rysiek" Woźniak

Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 931 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20150117/fd3483db/attachment-0001.sig>


More information about the cypherpunks mailing list