[Cryptography] open questions in secure protocol design?
Ryan Carboni
ryacko at gmail.com
Wed May 27 19:09:12 EDT 2015
>
>
>
> Can you give an example of where it actually worked out well?
>
http://arstechnica.com/security/2014/07/crypto-weakness-in-smart-led-lightbulbs-exposes-wi-fi-passwords/
it was a system that didn't even involve a key exchange protocol!
too bad security by obscurity does not work
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150527/d9f59d4a/attachment.html>
More information about the cryptography
mailing list