this post was submitted on 24 Feb 2025
102 points (96.4% liked)

Privacy

1948 readers
335 users here now

Welcome! This is a community for all those who are interested in protecting their privacy.

Rules

PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!

  1. Be civil and no prejudice
  2. Don't promote big-tech software
  3. No reposting of news that was already posted
  4. No crypto, blockchain, NFTs
  5. No Xitter links (if absolutely necessary, use xcancel)

Related communities:

Some of these are only vaguely related, but great communities.

founded 5 months ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Natanael@infosec.pub 2 points 1 month ago* (last edited 1 month ago)

Ask any competent cryptographer who read the docs and they'll tell you otherwise

(small sidenote: what the docs implied about cryptographic capabilities made it sound like they exploited weak reused Diffie-Hellman finite field primes - the description of advances in capabilities matched this outcome nearly exactly)

Feel free to visit !crypto@infosec.pub if you want to discuss details