| Deutsch English Français Italiano |
|
<vfcjir$2gc7o$4@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder2.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Lawrence D'Oliveiro <ldo@nz.invalid> Newsgroups: comp.os.linux.advocacy,comp.os.linux.misc Subject: Re: Torvalds Slams Theoretical Security Date: Thu, 24 Oct 2024 04:48:27 -0000 (UTC) Organization: A noiseless patient Spider Lines: 8 Message-ID: <vfcjir$2gc7o$4@dont-email.me> References: <pan$26699$6602b79b$4abe425a$df32a923@gnu.rocks> <_OmcnZpYmdE-PYX6nZ2dnZfqn_udnZ2d@earthlink.com> <wwvldyfmenf.fsf@LkoBDZeT.terraraq.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Injection-Date: Thu, 24 Oct 2024 06:48:27 +0200 (CEST) Injection-Info: dont-email.me; posting-host="f4e50c47efa3e669267791fe76a6c176"; logging-data="2633976"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19NMLw2/5JJoThO4hBk7TRf" User-Agent: Pan/0.160 (Toresk; ) Cancel-Lock: sha1:1V4EA0rMEG2YmO4v2KQjS7opocU= Bytes: 1414 On Wed, 23 Oct 2024 09:01:24 +0100, Richard Kettlewell wrote: > The obvious answer is attacks on weak cryptography. RSA-1024 and DH-1024 > are probably breakable by the biggest SIGINT agencies (and anyone else > with comparable compute resources: cloud service providers for example). Weak cryptography is easy to fix. The hard part to fix is weak random numbers.