Search Mailing List Archives

Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] - "The Beautiful & Secure Messenger"

Steve Weis steveweis at
Thu Jul 11 08:44:24 PDT 2013

It's not true that all widely used crypto implementations are open.

Even open source projects themselves depend on closed implementations.

For example, Linux, OpenSSL, GnuTLS, libgcrypt, and dm-crypt may all use
AESNI on x86, usually by default [1]. Linux now also uses a closed RdRand
[2] RNG if available.

The crypto implementation is secret. Even if you had the design, the tools
to even make sense of it are themselves proprietary and built on layers of
proprietary dependencies.

Here's some relevant links:


On Jul 11, 2013 3:32 AM, "danimoth" <danimoth at> wrote:
> If yes, ask yourself why *crypto design schemes and implementations are
> open and widely known, and only keys are secret.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>

More information about the liberationtech mailing list