Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You don’t need a backdoor in the encryption if you can backdoor the devices as such.

Crypto AG anyone?



In fairness, they backdoored the company, the crypto algorithms and the devices at Crypto AG.

Anyway, there are many more recent examples: https://en.wikipedia.org/wiki/Crypto_Wars

Don’t get me started on the unnecessary complexity added to TLS.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: