[Cryptography] Zoom publishes draft cryptographic design for end-to-end encryption

John Young jya at pipeline.com
Wed Jun 3 16:47:14 EDT 2020


In response to these critiques, isn't it wise to suspect/avoid any 
comsec/infosec which is widely touted, used and promoted due the 
likelihood it is compromised because of its popularity and wide 
usage, a handy honeypot for predators sniffing the wind?

Moreover, isn't that the Achilles heel of open source testing, 
verification and trustworthiness? Not to mention open discussion on 
public fora and invitees-only confabs sponsored by TLAs.

Trust but verify, and can't be too paranoid, the leery cryptographer 
muttered quietly, lurking.

OTP, can it be bested by any code, or is that a black hole imaginary?




More information about the cryptography mailing list