Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If it works (reasonably) it works, and it throws wrenches into the gears of security researchers when the code isn't the usual, immediately recognizable S boxes and other patterns or library calls.


Might be a bit a paranoia about official crypto libs backdoors, too.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: