Groups | Search | Server Info | Login | Register
Groups > comp.security.firewalls > #793
| From | Nomen Nescio <nobody@dizum.com> |
|---|---|
| References | <fe7a66b18826e66801c1b4c11d5b2dd5@dizum.com> <f9797ffc2d44c49252244a082fe133c4@remailer.paranoici.org> <0b22bdc4ed57959f8699d68e3485f019@dizum.com> |
| Subject | Re: How are the remailers protecting their remailer servers? |
| Message-ID | <bab73dc91e9fcac65abbe37436c544e2@dizum.com> (permalink) |
| Date | 2018-03-15 00:37 +0100 |
| Newsgroups | alt.computer.security, alt.privacy.anon-server, alt.security, comp.security.firewalls, comp.security.misc |
| Organization | dizum.com - The Internet Problem Provider |
Cross-posted to 5 groups.
Nomen Nescio <nobody@dizum.com> wrote: >In article ><f9797ffc2d44c49252244a082fe133c4@remailer.paranoici.org> >Anonymous <nobody@remailer.paranoici.org> wrote: >> >> Nomen Nescio <nobody@dizum.com> wrote: >> >> > Most are probably using RSA. Since the NSA and other intels were in on the RSA diluting so that it could be more easily broken, it would seem wise that all remailers switch to Curve25519 (ECC) keys to access their servers. This is not difficult to do. >> >> And what makes you so sure that NSA promoted Curve#$%^& is more secure >> than well understood and implemented RSA? > >speaking for myself, i helped break rsa. use anything but. So how long does it take the NSA to break a 4096-bit RSA key?
Back to comp.security.firewalls | Previous | Next — Previous in thread | Find similar
Re: How are the remailers protecting their remailer servers? Nomen Nescio <nobody@dizum.com> - 2018-03-11 22:51 +0100 Re: How are the remailers protecting their remailer servers? Nomen Nescio <nobody@dizum.com> - 2018-03-15 00:37 +0100
csiph-web