Cryptography@lemmy.mlbyArthur Besse@lemmy.ml8 monthsNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?blog.cr.yp.to English 0483%5