On Thu, Nov 27, 2014 at 1:04 AM, ianG wrote:
> http://underhandedcrypto.com/rules/
>
> The Underhanded Crypto contest was inspired by the famous Underhanded C
> Contest, which is a contest for producing C programs that look correct, yet
> are flawed in some subtle way that makes them behave inapp
ianG quotes:
>Can you design an encrypted chat protocol that looks secure to everyone who
>reviews it, but in reality lets anyone who knows some fixed key decrypt the
>messages?
Since some of the organisers read this list and this question may be relevant
for other contributors as well I'll as
Related: I recently gave a talk about crypto backdooring, at NoSuchCon
last week, slides are available at
https://131002.net/data/talks/backdooring_nsc14.pdf
On Wed, Nov 26, 2014 at 6:04 PM, ianG wrote:
> http://underhandedcrypto.com/rules/
>
> The Underhanded Crypto contest was inspired by the
http://underhandedcrypto.com/rules/
The Underhanded Crypto contest was inspired by the famous Underhanded C
Contest, which is a contest for producing C programs that look correct,
yet are flawed in some subtle way that makes them behave
inappropriately. This is a great model for demonstrating