Re: [cryptography] Backdoors in software

2013-09-09 Thread David D
it. IMO. -Original Message- From: cryptography [mailto:cryptography-boun...@randombit.net] On Behalf Of john espiro Sent: Monday, September 09, 2013 2:10 PM To: 'Crypto list' Subject: [cryptography] Backdoors in software Reading this PDF: http://www.techarp.com/article/LEA

Re: [cryptography] Backdoors in software

2013-09-09 Thread John Young
The document you cited hosted by Techarp is claimed to be a hoax based on an earlier authentic document from 2012. A notice about it: http://cryptome.org/2013/09/computer-forensics-2013.pdf However, with recent revelations about NSA some of the document's assertions may turn to have more truth

Re: [cryptography] Backdoors in software

2013-09-09 Thread john espiro
: [cryptography] Backdoors in software That document is fake.  It was an April Fools joke based on a real document.  Refer to: https://www.schneier.com/blog/archives/2013/08/opsec_details_o.html TrueCrypt can be assumed ok based on Greenwald using it.    If Snowden knew of a hole in TrueCrypt

Re: [cryptography] Backdoors in software

2013-09-09 Thread Nicolai
On Mon, Sep 09, 2013 at 02:20:35PM +0200, David D wrote: TrueCrypt can be assumed ok based on Greenwald using it.If Snowden knew of a hole in TrueCrypt then Greenwald would not be using it. IMO. I don't think this is a useful criteria. After all, Greenwald probably uses Windows, right?

Re: [cryptography] Backdoors in software

2013-09-09 Thread Eugen Leitl
On Mon, Sep 09, 2013 at 01:50:54PM -0500, Nicolai wrote: On Mon, Sep 09, 2013 at 02:20:35PM +0200, David D wrote: TrueCrypt can be assumed ok based on Greenwald using it.If Snowden knew of a hole in TrueCrypt then Greenwald would not be using it. IMO. I don't think this is a useful