This video on the attempted hacking of XZ (and therefore, all of Linux and most of the Internet) is great, not only for the story but for the clear/concise descriptions of key exchange, public key encryption and compression work. (And I wasn’t aware of some of the other aspects, like audit hooks). How far back […]
No comments yet. Log in to reply on the Fediverse. Comments will appear here.