SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : The coming US dollar crisis -- Ignore unavailable to you. Want to Upgrade?


To: ggersh who wrote (55174)4/14/2014 11:35:58 AM
From: maceng2  Read Replies (2) | Respond to of 71477
 
From 30 Jan 2014.

NSA's solution was to bypass democratic mechanisms and undermine our infrastructure anyway. With a mix of tactics that include the infiltrating and coercing of security companies to include weaknesses in their products, NSA's efforts focused on breaking Secure Sockets Layer and Virtual Private Networks, standards that users worldwide trust and depend on to ensure that their messages and transactions make it to the intended recipient and that recipient alone—not the NSA.

eff.org

I'm not a knowledgeable person on the subject, but to me it looks as if the glove fits, and the NSA is run by a bunch of ultra control freak kooks, and irresponsible ones at that.

from the earlier post...

Robin Seggelmann, a programmer based in Germany, submitted the code in an update submitted at 11:59pm on New Year's Eve, 2011. It was supposed to enable a function called "Heartbeat" in OpenSSL, the software package used by nearly half of all web servers to enable secure connections.

&

He told the Guardian that the mistake has nothing to do with its festive datestamp. "The code… was the work of several weeks. It’s only a coincidence that it was submitted during the holiday season.

theguardian.com

Yeah, it sure was a coincidence.