NSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?
Submitted 1 day ago by cm0002@sh.itjust.works to technology@lemmy.zip
https://blog.cr.yp.to/20251004-weakened.html
Submitted 1 day ago by cm0002@sh.itjust.works to technology@lemmy.zip
https://blog.cr.yp.to/20251004-weakened.html