Hacker Poesy
  • FAQ
  • Login
  • Public

    • Public
    • Groups
    • Recent tags
    • Popular
    • Directory

Conversation:

Notices

  1. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 06-Jan-2014 02:44:27 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    Michael Lee @mukimu of ZDNet writes about proof-of-concept code demonstrating the Dual_EC_DRBG random number generator vulnerability http://www.zdnet.com/nsa-encryption-backdoor-proof-of-concept-published-7000024793/ In December Theodore Ts'o approved a Linux kernel patch to initialize SHA starting value with the hardware RNG http://lkml.indiana.edu/hypermail/linux/kernel/1312.2/01593.html (apparently in spite of his earlier protests: https://lkml.org/lkml/2013/9/5/275 ) !crypto !surveillance
    Monday, 06-Jan-2014 02:44:27 EST from sn.jonkman.ca permalink
    • Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 06-Jan-2014 03:05:10 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
      Remote profile options...
      @mukimu also writes " While the NSA-defined values of P and Q are unknown…" — how people write an implementation if P and Q are unknown? I think he must have meant "the *relationship between* P and Q are unknown"
      Monday, 06-Jan-2014 03:05:10 EST permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

Hacker Poesy is a GNU social hub. It runs version 1.1.3-beta3, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Hacker Poesy content and data are available under the Creative Commons Attribution 3.0 license.

Switch to mobile site layout.