On 1/9/2014 15:52, m.roth@5-cent.us wrote:
Robert Moskowitz wrote:
Only algorithm they compromised was an RNG that got pretty strong thumbs down from the real cryptographers. They have not compromised any IETF standard;
Not quite - anyone mandated to POSIX standards are effectively mandated to use the compromised algorithms, as I understand it.
I think you mean FIPS 140-2, not POSIX: http://goo.gl/nLTCF8