Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
etiam
on Feb 12, 2020
|
parent
|
context
|
favorite
| on:
How the CIA used Crypto AG encryption devices to s...
There may be some new documents available now, but the story as such seems to have been known for a while. I first learned of it last summer while reading some of the drafts for Ross Anderson's update of his excellent
Security Engineering
.
See chapter 26,
https://www.cl.cam.ac.uk/~rja14/book.html
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
See chapter 26, https://www.cl.cam.ac.uk/~rja14/book.html