[cryptography] Which encryption chips are compromised?

Greg Rose ggr at seer-grog.net
Sun Nov 10 10:40:27 EST 2013

Perhaps David Naccache’s proportional font method could be applied to this problem. For example, maybe “Discretix XX950” (I just made up that part number, can’t find one on their web site) would fit perfectly.


On Nov 10, 2013, at 5:31 , John Young <jya at pipeline.com> wrote:

> The Guardian version (greater redaction):
> http://s3.documentcloud.org/documents/784159/sigintenabling-clean-1.pdf
> NYTimes-ProPublica version (lesser redaction):
> http://s3.documentcloud.org/documents/784280/sigint-enabling-project.pdf 
> [0] A related question is where were these slides posted on the Guardian and NYT sites?  Which did which redaction?
>> [1]
>> https://twitter.com/ashk4n/status/375758189444493312/photo/1
>> http://financialcryptography.com/mt/archives/001455.html
> _______________________________________________
> cryptography mailing list
> cryptography at randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography


Phone: +1 619 890 8236 
secure voice / text: Seecrypt +28131139047 (referral code 54smjs if you want to try it).
PGP: 09D3E64D 350A 797D 5E21 8D47 E353 7566 ACFB D945 (id says ggr at usenix.org, but don’t use that email)

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 2279 bytes
Desc: not available
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20131110/ad73b98d/attachment.p7s>

More information about the cryptography mailing list