Re: Can we trust RedHAt encryption tools?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 2014-01-09, Robert Moskowitz <rgm@xxxxxxxxxxxxxxx> wrote:

(...)

> You want to talk about leaky code?  Look how corporate mail proxies work 
> to enable them to read encrypted emails.  Simple lying about certs.

That sounds worrying. Could you elaborate, or provide a citation?

-- 

Liam


_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux