On 1/9/2014 15:52, m.roth at 5-cent.us wrote: > Robert Moskowitz wrote: >> >> Only algorithm they compromised was an RNG that got pretty strong thumbs >> down from the real cryptographers. They have not compromised any IETF >> standard; > > Not quite - anyone mandated to POSIX standards are effectively mandated to > use the compromised algorithms, as I understand it. I think you mean FIPS 140-2, not POSIX: http://goo.gl/nLTCF8