Bubbles
10 points · 2 hours ago · 0 comments

This video on the attempted hacking of XZ (and therefore, all of Linux and most of the Internet) is great, not only for the story but for the clear/concise descriptions of key exchange, public key encryption and compression work. (And I wasn’t aware of some of the other aspects, like audit hooks). How far back […]

No comments yet. Log in to reply on the Fediverse. Comments will appear here.