On 12/31/2014 06:40 PM, Robert J. Hansen wrote:
The protocol was secure: you just had to configure it correctly.

Yes, thank you for your tidy summary of "Security 101." :)

What I'm looking for is some sort of concrete information about "When ssh is configured <this way> the NSA can break it." I've seen quite a few sites make the claim that "zomg, ssh is broken!" but haven't yet seen any specifics.

Doug


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to