Kevin Karhan :verified: · @kkarhan
1010 followers · 60921 posts · Server mstdn.social

@mpoletiek @aral and also even if they commit any code that has "glowie aura" it would still face rigorious examination.

Cuz the people at and are very restrictive in adding stuff, which is why , and other didn't make it into those...

#govware #speck #dual_ec_drbg #openssh #OpenSSL

Last updated 1 year ago

Kevin Karhan :verified: · @kkarhan
785 followers · 38372 posts · Server mstdn.social
Kevin Karhan :verified: · @kkarhan
786 followers · 38416 posts · Server mstdn.social

@TimWardCam @bert_hubert

Also you're overexaggregating cuz if customers of ANY kind would take seriously, then participation in programs like and integrating like would not only be considered [which they are: it's called ] but be entirely banned from selling their products at all.

c.im/@TimWardCam/1100504731380

#espionage #felonies #dual_ec_drbg #govware #prism #ITSec

Last updated 1 year ago

mkj · @mkj
33 followers · 418 posts · Server social.linux.pizza

@ManningPublications "In Implementing and Exploiting Cryptography you’ll find unique guidance for creating strong cryptography that can withstand attempts to exploit it including: * DUAL_EC_DRBG random number generator using Go’s elliptic curve library * ..."

Come again!?

is a top example for secure ?

What's next, single-round MD5 for password hashing? DES ECB for full disk encryption? Secure keybit generators such as A5/1?

#dual_ec_drbg #cryptography

Last updated 1 year ago

Kevin Karhan :verified: · @kkarhan
350 followers · 6218 posts · Server mstdn.social

@peepstein not shure what standards you mean.

IMHO their stuff is pretty solid and once setup properly they have sane defaults on.

Proper & documented setup is key to it.

Considering like , et. al. are banned until they apologize for it x3 the duration it took them.

#cisco #dual_ec_drbg #govware

Last updated 2 years ago