<div dir="ltr"><div class="gmail_extra"><br><div class="gmail_quote">On 18 September 2013 22:23, Lucky Green <span dir="ltr"><<a href="mailto:shamrock@cypherpunks.to" target="_blank">shamrock@cypherpunks.to</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div id=":1m0" style="overflow:hidden">According to published reports that I saw, <span class="">NSA</span>/DoD pays $250M (per<br>

year?) to backdoor cryptographic implementations. I have knowledge of<br>
only one such effort. That effort involved DoD/<span class="">NSA</span> paying $10M to a<br>
leading cryptographic library provider to both implement and set as<br>
the default the obviously backdoored Dual_EC_DRBG as the default RNG.</div></blockquote></div><br>Surprise! The "leading blah blah" was RSA: <a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a>.</div>
<div class="gmail_extra"><br></div></div>