• bearboiblake@pawb.social
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    edit-2
    2 days ago

    I think you’re missing the point. Dual_EC_DRBG is a random number generator, standardized by National Institute of Standards and Technology. It was a NIST standard, widely used by many others beyond the RSA corporation itself, and is likely still in use. We know for a fact that the RSA corporation was compromised by the NSA, but this goes beyond them. More importantly, what else has the NSA compromised that don’t we know about? This is just one story.

    You can save your replies, I’m not going to discuss this further.

    Edit: Jesus, dude, you are seriously invested in defending NSA backdoors, huh? Keep screaming into the void. I’m changing nothing, keep yapping if you want to.

    • Redjard@reddthat.com
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      2 days ago

      NSA has long since broken RSA

      This is clearly referring to the algorithm. You don’t “break” a company.

      There is also little reason to bring up the RSA company at all, it is for all intents completely irrelevant.

      Please just edit your root message to talk about the EC (Dual_EC_DRBG) that is not really in use anywhere but at least real and something security people know of.

      If you say the nsa has broken rsa, you are making a lot of sysadmins sweat for no reason.

    • Redjard@reddthat.com
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      2 days ago

      Speaking of which

      and intentionally put vulnerabilities into Ec25519

      25519 is the fixed one. It is also not backdoored. Please fix that aswell. It is only Dual_EC_DRBG that is affected, not RSA nor ECDSA/ED25519