On Fri, 11 Apr 2014 19:15:00 +1200 Richard Hector <rich...@walnut.gen.nz> wrote:
> On 11/04/14 09:41, ario wrote: > > On Thu, 10 Apr 2014 19:04:27 +0200 > > Pongrácz István <pongracz.ist...@gmail.com> wrote: > > > >> > What if they implemented this "feature" to be able to get > >> > information without trace? :)))) > > Then they would have succeeded spectacularly with us thinking > > "there is a bug" in OpenSSL. > > > > My preferred beckup encryption scheme still would be the One Time > > Pad (OTP) as it seems really unbreakable, if it were not for the > > recurrency in the problem of: "Where do I backup the OTP itself, > > and how do I encrypt it?" > > > > Heartbleed isn't a problem with the encryption though; the encryption > didn't get broken. Any protocol could probably potentially suffer > from a buffer overflow due to a bug in the software. Given this one > leaked info from the server process, who's to say it wouldn't leak > your one-time pad? You are right: It probably would. :) ario > Richard > > > ------------------------------------------------------------------------------ > Put Bad Developers to Shame > Dominate Development with Jenkins Continuous Integration > Continuously Automate Build, Test & Deployment > Start a new project now. Try Jenkins in the cloud. > http://p.sf.net/sfu/13600_Cloudbees > _______________________________________________ > Ledger-smb-users mailing list > Ledger-smb-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/ledger-smb-users ------------------------------------------------------------------------------ Put Bad Developers to Shame Dominate Development with Jenkins Continuous Integration Continuously Automate Build, Test & Deployment Start a new project now. Try Jenkins in the cloud. http://p.sf.net/sfu/13600_Cloudbees _______________________________________________ Ledger-smb-users mailing list Ledger-smb-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ledger-smb-users