i could design a cryptographic protocol. i wouldn't introduce side channels. there would be no obscure attacks. it would be confidential. it would have integrity. there would be no oversights


You must log in to comment.

in reply to @bark's post: