[Cryptography] open questions in secure protocol design?

Ryan Carboni ryacko at gmail.com
Wed May 27 19:09:12 EDT 2015


>
>
>
> Can you give an example of where it actually worked out well?
>


http://arstechnica.com/security/2014/07/crypto-weakness-in-smart-led-lightbulbs-exposes-wi-fi-passwords/

it was a system that didn't even involve a key exchange protocol!

too bad security by obscurity does not work
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150527/d9f59d4a/attachment.html>


More information about the cryptography mailing list