Welcome to WebmasterWorld Guest from 18.104.22.168
But what sorts of access, to what products, has been requested and given? What crypto is, and isnít, back-doored or otherwise subverted? What has, and hasnít, been fixed?
Near as I can tell, the answer on what has been requested is everything: deliberate weakenings of encryption algorithms, deliberate weakenings of random number generations, copies of master keys, encryption of the session key with an NSA-specific key Ö everything.
NSA surveillance is robust. I have no inside knowledge of which products are subverted and which are not. Thatís probably the most frustrating thing. We have no choice but to mistrust everything. And we have no way of knowing if weíve fixed anything. [y.ahoo.it...]
Surely that's begging the question?
No doubt the messenger figured a spoon full of sugar would help the medicine go down.
Apparently there's more to come...