Robert Moskowitz wrote:
On 01/09/2014 05:28 PM, John R Pierce wrote:
On 1/9/2014 2:20 PM, Eero Volotinen wrote:
It might be easier to compromise security of commercial products as source code is not available. they seem to have succeeded in compromising
STANDARDS and ALGORITHMS, to heck with implementations.
Only algorithm they compromised was an RNG that got pretty strong thumbs down from the real cryptographers. They have not compromised any IETF standard; maybe kept quite about a problem, but have not put holes in any. Most of our problems with TLS is implementations and backwards compatiblity options.
Not quite - anyone mandated to POSIX standards are effectively mandated to use the compromised algorithms, as I understand it.
mark