Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

that's pretty much the approach on all crypto. crack the implementation, not the algorithm.


It's rather "steal the message after decrypted" scenario, rather than cracking the implementation.


I think they were referencing, "Most crypto is bypassed rather than broken."


exactly




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: