Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>It's basically common knowledge at this point

What is asserted without evidence can be dismissed without evidence.

And what's really annoying is that you are doing a bad job of arguing for a position that I actually kinda agree with. NIST has published a backdoored elliptic curve-based RNG[1]; don't trust them. Encryption algorithms need some sort of verifiable provenance for where those numbers came from.

[1]: https://en.wikipedia.org/wiki/Dual_EC_DRBG



On that note, it's unfortunate that T2 can only create ecdsa-sha2-nistp256 secret keys. Right now I use Secretive but I might resort to a different utility that generates ed25519 and stores it within keychain, if there is one.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: