Difference between revisions of "CRYPTANALYTICS"
From Buggedplanet.info
Jump to navigationJump to searchLine 8: | Line 8: | ||
|- | |- | ||
|20141229||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/snowden-dokumente-nsa-attacken-auf-ssl-vpn-ssh-tor-a-1010553.html NSA-Attacken auf SSL, VPN, SSH, Tor etc.: Das sind die Snowden-Dokumente]||[[NSA]] / [[CRYPTANALYTICS]] | |20141229||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/snowden-dokumente-nsa-attacken-auf-ssl-vpn-ssh-tor-a-1010553.html NSA-Attacken auf SSL, VPN, SSH, Tor etc.: Das sind die Snowden-Dokumente]||[[NSA]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35547.pdf GCHQ Document: Crypt Ops Data Store User Guide]||[[GCHQ]] / [[CRYPTANALYTICS]] | ||
|- | |- | ||
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35544.pdf NSA Document: SIGINT Strategy Threads 4 and 7 (from SID Today)]||[[NSA]] / [[CRYPTANALYTICS]] | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35544.pdf NSA Document: SIGINT Strategy Threads 4 and 7 (from SID Today)]||[[NSA]] / [[CRYPTANALYTICS]] |