From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.4 Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail From: =?UTF-8?B?QmrDtnJu?= Persson Newsgroups: comp.lang.ada Subject: Re: library/binding for sftp? Date: Fri, 9 Aug 2013 11:19:22 +0200 Message-ID: <20130809111922.0fb5b68b@hactar.xn--rombobjrn-67a.se> References: <85li4gmhrt.fsf@stephe-leake.org> <2wgl8bcmdsu0$.1rs1604fzwufv.dlg@40tude.net> <85vc3jfias.fsf@stephe-leake.org> <1gwg87tgm2bo7$.ae7440ka6kmc.dlg@40tude.net> <85bo59g6h7.fsf@stephe-leake.org> <5987935c-dbce-4602-b0e6-2bb85513588b@googlegroups.com> <9oo34px7j5ko$.1j7bcnxwzgcxe.dlg@40tude.net> <20130808111404.5fc6ce14@hactar.xn--rombobjrn-67a.se> <1nfcrgjw8vkrb.1aukq12ys882l$.dlg@40tude.net> <20130808133709.09dfef98@hactar.xn--rombobjrn-67a.se> <2d28eb38-0cbc-4f43-983c-d11318614491@googlegroups.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Trace: individual.net RKHq/8Vo8pCqJnrbbaYAcwKnOXG5V2dasMWwi8MCKWMQANTdbU Cancel-Lock: sha1:qTxZSWX8E+m/zNBLzfhAAEnETsQ= X-Newsreader: Claws Mail 3.9.0 (GTK+ 2.24.13; x86_64-redhat-linux-gnu) Xref: news.eternal-september.org comp.lang.ada:16711 Date: 2013-08-09T11:19:22+02:00 List-Id: Alan Jump wrote: > I'd much prefer to place a certain level of trust into peer-reviewed, > thoroughly-tested algorithms than in an internally-developed process > of unknown and untried effectiveness. This is wise. Anyone can come up with a cipher that he himself cannot break, but that doesn't mean that no one else can break it. I don't remember who said that first, possibly Bruce Schneier, but it's a truth you should always keep in mind when people are promoting their own proprietary ciphers and security schemes. Bj=C3=B6rn Persson