On Fri, Mar 21, 2014 at 7:01 AM, John Young <[email protected]> wrote: > Sys admins catch you hunting them and arrange compromises > to fit your demands so you can crow about how skilled you are.
Insiders are always your biggest threat. > Then you hire them after being duped as you duped to be hired. > > The lead Tor designer reportedly (via Washington Post) had a > session with NSA to brief on how to compromise it, although > "compromise" was not used nor is the word used by > gov-com-org-edu. Er, so? The NSA could just... read the public docs and source anyways. I'd personally love to be able to sit down with NSA cryptonerds and chat -- if they talked at all I'd learn something. As long as there was no coercion anyways. Nico -- _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
