NSA and IETF: Can an attacker purchase standardization of weakened cryptography?

Status
Not open for further replies.
Status
Not open for further replies.
Top