For coordination purposes, I think it would be useful for those who plan on submitting a response mark that they’ll do so, and perhaps tell a little about the contents of their response. It would also be useful for those who don’t plan on responding to explain why not.
The majority of my response is in reducing our systems exposure vulnerabilities. As a believer in the power of strong cryptography no matter the intelligence involved, I am going to explain the value of removing or spinning down of the NSA/CIA program of back-doors, zero day exploits, and intentional cryptographic weaknesses that have been introduced into our hardware and software infrastructure.
For coordination purposes, I think it would be useful for those who plan on submitting a response mark that they’ll do so, and perhaps tell a little about the contents of their response. It would also be useful for those who don’t plan on responding to explain why not.
The majority of my response is in reducing our systems exposure vulnerabilities. As a believer in the power of strong cryptography no matter the intelligence involved, I am going to explain the value of removing or spinning down of the NSA/CIA program of back-doors, zero day exploits, and intentional cryptographic weaknesses that have been introduced into our hardware and software infrastructure.