TL;DR some claims that SSL and all other encryption has been rendered obsolete by backdoors they have discovered in certain components. If true this would have massive implications for Maidsafe but also for bitcoin as encryption is what prevents doublespending and basically gives value to the currency. Has anyone seen this yet? Thoughts?
And this is where projects like SAFE can be a solution rather than being caught up in the problems in other encryption methods.
SAFE doesnât have a backdoor, so it does not fall under the above analysis. It is opensource so its encryption methods can be examined and checked for any backdoors.
Having read that article, it starts of as an infomercial with typical ranting and raving.
Then after 300 odd lines they say lets show it with some concrete examples
Then after running the openssl command 3 times without breaking anything they conclude with
EDIT: BTW padding is often required in encryption because they need to encrypt blocks of certain size and not all files have exactly the right number of bytes.
Perhaps the real question is âWas this a serious article???â
Honestly its been so long since Iâve looked at actual encryption code I just wanted some other eyes on this. I was hoping that is was a hoax/not real but couldnât really tell myselfâŚ
If it helps, we use sodium which is a cross platform version of Bernsteins NACL library. It has lots of eyes on it. Zcash use the same and we have discussed a joint audit of that codebase to further ensure no backdoors/bad bugs etc. Itâs pretty good code though and can be audited. The parts we use are very small in themselves. There is also rust code available, but we do not use that yet as itâs not well enough reviewed and I have caution over llvm optimisations with regards to timing attacks (the c libs have constant time ops which help there, llvm (which can also compile c code) is not clear in that it wold not optimise away the constant time blocks for more efficiency, but in crypto thatâs not always whatâs required).
I would love to see llvm/rust code get a serious review as safety is also a massive consideration.
The ominous âwarningsâ hidden in the comments by a mysterious âcontractorâ turn out after a bit of googling to be a bona fida remark by the developers about the practical limits of randomness, at least thatâs how I read it (original doc here). I canât speak about the validity of the experiments, but the general tone and a number of red herrings (The Larry Hughes Jr. reference is another one) suggest this should be filed under âinteresting but probably nonsenseâ.
I donât think we need to worry, the guy never break anything
He is interpreting some âin code commentsâ as warning when they are not really
He is able to replicate encryption (with the password and every info necessary for that) : any one can do that as long as you have the algorithm, which you can have since it is opensource, I would even say : thank god you can replicate it.
Also the post is unreadable, looks like some kind of personal notes made with notepad from a teen that want to play special agents (or something like that)
I think the three number are some kind of timestamp, thatâs why they are always different. (not the usual unix timestamp, too big for that)