-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 09/06/2013 08:48 PM, Chris Palmer wrote:
> Why would they perform the attack only for encryption software? > They could compromise people's laptops by spiking any popular app. What is more important to them: A single system, or all of the comms going into and coming out of it? - -- The Doctor [412/724/301/703] [ZS] Developer, Project Byzantium: http://project-byzantium.org/ PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ Too bizarre for real life, too normal to wind up on Art Bell. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.20 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlIqngUACgkQO9j/K4B7F8EtYgCgtMPqxWguJq/ey3jj/jsPFA3V iD0AoOSHbT8ZLZ7YxNLqdy5uOiS/6o4p =DGj7 -----END PGP SIGNATURE----- _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography