Hacker News new | past | comments | ask | show | jobs | submit login

>All public encryption algorithms have backdoors in their implementation and sometimes (as with Elliptic Curve standards from NIST adopted in the browser) in their spec

Lets see your proofs demonstrating this




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: