Yes. But this is, in comparison with the security of modern Open Source codes, an irrelevant loss.
Loss of security is not irrelevant. It's the central matter. Open Source codes are irrelevant - this is not Open Source code.
So I have to explain you the difference between a method which has some chance of success which can be expected in the order of, say, 10% (where even 0.1% would be much much more than the chance to break modern Open Source encryption), and one which is "unstoppable and guaranteed to be successful"?
You have to explain to me why you used "sufficient" if you didn't mean it - and similar references in other posts - in making an argument I summarized accurately.
You also have to quit trying to hide behind irrelevancies like the existence of Open Source code. We aren't talking about Open Source code. Nobody uses it for military or governmental security, and nobody involved in this incident uses it - not the Russians, not the Chinese, not anybody. It's irrelevant.
First, they certainly would not allow it to be used in their own public offices. Because this would make them vulnerable to NSA.
No, it wouldn't. It would put them in control of what the NSA thinks it knows (as long as the NSA doesn't know they found it).
Meanwhile, they have info on all the other vulnerabilities they found in this widely used code, and they can plug their own backdoor and others whenever they want to.
What would they do? Ok, they would give the FSB two weeks or how much they need to attack whatever is vulnerable and worth to be attacked around the world.
Why only two weeks? Knowing the NSA backdoor would be a permanent advantage for them - as long as nobody knows they have it - on top of whatever else they found.
. So, if {the Pentagon} would ignore the information that the Russian and Chinese, after looking at the code, forbid it to be sold to their public offices, they would be stupid.
That would not be informative to the Pentagon.
If HP wants to hide this, maybe. But this would be stupid.
No, it would not. It would be profitable, and good for business, and the expected outcome.
Don't forget simple security measures which the Russians will insist to do:
Your imaginary world of very stupid Russians and equally oblivious Pentagon security folk is a waste of time.
No. If you use "security by obscurity", good old espionage is dangerous, foolishly displaying the source code too.
And since that is the situation, we have what appears to be complete agreement on the universal folly displayed in HP's betrayal of US and Pentagon security.
- - - -
So what are you posting about the rest of the time here?
Iceaura has defamed me, suggesting that I have made such a stupid claim.
In post 44, among others, you made the relevant claim - including right here, where you backtrack a bit:
But there is also a sufficiently large probability that it will be broken, at least if breaking it is sufficiently interesting for foreign security agencies. Hard to estimate the probabilities, I would say something between 10% and 50%. One can look at classical history of how much about the enemy has been known and how much remained hidden, and would find that quite a lot was known.
In the first place, a sufficiently large probability of a breach is a breach - it has to be treated as a breach. In the second, making the breach probability higher is a bad thing - a betrayal - no matter what it is.
Meanwhile: If you're worried about being defamed, quit posting ridiculous crap like that estimate of the odds of "breaking" - whatever that means - the Pentagon's cybersecurity system. Nothing I post sends you up higher than that kind of stuff.