cm0002@sh.itjust.works to Technology@lemmy.zipEnglish · 22 hours agoNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?blog.cr.yp.toexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?blog.cr.yp.tocm0002@sh.itjust.works to Technology@lemmy.zipEnglish · 22 hours agomessage-square0linkfedilink