On Mon, Mar 31, 2014 at 3:33 PM, ianG <[email protected]> wrote:
> ...
> In some ways, this reminds me of the audit reports for compromised CAs.
>  Once you know the compromise, you can often see the weakness in the
> report.

are these public reports?  such a collection of compromise reports
would be informative. (if you've got a list :)


best regards,
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to