Create a new account
Never heard of lsh before. Does having lsh as the first solution suggest to anyone besides me that this is an attempt to beef up one project's marketshare at the expense of another?
If it's real, it'll make slashdot. If ssh has the exploit but lsh doesn't, then ssh will be fixed. If it's unfixable, both are broken, and a new protocol will be invented. If it's an aspect common to all security protocols, we're hosed and there's no such thing as encryption anymore.
Reply to This
Ilya Martynov (http://martynov.org/ [martynov.org])
There it goes. [slashdot.org] Must be real.
Get More Comments