2300+ entries in 0.183s

Framedragger:
http://btcbase.org/log/2017-05-31#1663689 << i believe you misquoted out of context. the purpose of that was to (as you can see if you read till end of para), "The challenge here is to show that secure multi-user
RSA key generation can becarried out more efficiently than one-user-at-a-time
RSA key generation"
☝︎ CluelessNoob: gpg: Signature made Sat 10 Sep 2016 03:03:18 PM MST using
RSA key ID 2EF25247
mircea_popescu: anyway, their contact scheme (summarized/cleanned up : cookie + pubkey + signature with same pubkey) is not terrible. uses
rsa, which is a +.
mircea_popescu: While the documents describes an incredibly powerful code-breaking project, according to what hacker and computer researcher Andrew "Bunnie" Huang told The Intercept, if you're using the latest encryption, you don't have anything to worry about. "Even if [WindsorGreen] gave a 100x advantage in cracking strength, it's a pittance compared to the additional strength conferred by going from say, 1024-bit
RSA to 4096-bit
RSA or go