Search Mailing List Archives
[liberationtech] Heml.is - "The Beautiful & Secure Messenger"
steveweis at gmail.com
Thu Jul 11 08:44:24 PDT 2013
It's not true that all widely used crypto implementations are open.
Even open source projects themselves depend on closed implementations.
For example, Linux, OpenSSL, GnuTLS, libgcrypt, and dm-crypt may all use
AESNI on x86, usually by default . Linux now also uses a closed RdRand
 RNG if available.
The crypto implementation is secret. Even if you had the design, the tools
to even make sense of it are themselves proprietary and built on layers of
Here's some relevant links:
On Jul 11, 2013 3:32 AM, "danimoth" <danimoth at cryptolab.net> wrote:
> If yes, ask yourself why *crypto design schemes and implementations are
> open and widely known, and only keys are secret.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the liberationtech