[Cryptography] Zoom publishes draft cryptographic design for end-to-end encryption
John Young
jya at pipeline.com
Wed Jun 3 16:47:14 EDT 2020
In response to these critiques, isn't it wise to suspect/avoid any
comsec/infosec which is widely touted, used and promoted due the
likelihood it is compromised because of its popularity and wide
usage, a handy honeypot for predators sniffing the wind?
Moreover, isn't that the Achilles heel of open source testing,
verification and trustworthiness? Not to mention open discussion on
public fora and invitees-only confabs sponsored by TLAs.
Trust but verify, and can't be too paranoid, the leery cryptographer
muttered quietly, lurking.
OTP, can it be bested by any code, or is that a black hole imaginary?
More information about the cryptography
mailing list