it. IMO.
-Original Message-
From: cryptography [mailto:cryptography-boun...@randombit.net] On Behalf Of
john espiro
Sent: Monday, September 09, 2013 2:10 PM
To: 'Crypto list'
Subject: [cryptography] Backdoors in software
Reading this PDF:
http://www.techarp.com/article/LEA
The document you cited hosted by Techarp is claimed to be
a hoax based on an earlier authentic document from 2012.
A notice about it:
http://cryptome.org/2013/09/computer-forensics-2013.pdf
However, with recent revelations about NSA some of the
document's assertions may turn to have more truth
: [cryptography] Backdoors in software
That document is fake. It was an April Fools joke based on a real
document. Refer to:
https://www.schneier.com/blog/archives/2013/08/opsec_details_o.html
TrueCrypt can be assumed ok based on Greenwald using it. If Snowden
knew of a hole in TrueCrypt
On Mon, Sep 09, 2013 at 02:20:35PM +0200, David D wrote:
TrueCrypt can be assumed ok based on Greenwald using it.If Snowden
knew of a hole in TrueCrypt then Greenwald would not be using it. IMO.
I don't think this is a useful criteria. After all, Greenwald probably
uses Windows, right?
On Mon, Sep 09, 2013 at 01:50:54PM -0500, Nicolai wrote:
On Mon, Sep 09, 2013 at 02:20:35PM +0200, David D wrote:
TrueCrypt can be assumed ok based on Greenwald using it.If Snowden
knew of a hole in TrueCrypt then Greenwald would not be using it. IMO.
I don't think this is a useful