On Mon, Mar 31, 2014 at 3:33 PM, ianG <[email protected]> wrote: > ... > In some ways, this reminds me of the audit reports for compromised CAs. > Once you know the compromise, you can often see the weakness in the > report.
are these public reports? such a collection of compromise reports would be informative. (if you've got a list :) best regards, _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
