Ask any competent cryptographer who read the docs and they’ll tell you otherwise
(small sidenote: what the docs implied about cryptographic capabilities made it sound like they exploited weak reused Diffie-Hellman finite field primes - the description of advances in capabilities matched this outcome nearly exactly)
Ask any competent cryptographer who read the docs and they’ll tell you otherwise
(small sidenote: what the docs implied about cryptographic capabilities made it sound like they exploited weak reused Diffie-Hellman finite field primes - the description of advances in capabilities matched this outcome nearly exactly)
Feel free to visit !crypto@infosec.pub if you want to discuss details