On 12/31/2014 06:40 PM, Robert J. Hansen wrote:
The protocol was secure: you just had to configure it correctly.
Yes, thank you for your tidy summary of "Security 101." :)
What I'm looking for is some sort of concrete information about "When
ssh is configured <this way> the NSA can break it." I've seen quite a
few sites make the claim that "zomg, ssh is broken!" but haven't yet
seen any specifics.
Doug
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users