from the Security Cryptography Whatever podcast, talking about openssl API design choices: https://youtu.be/jhdLja5mWbU

| Pronoun | er/he |

https://access.redhat.com/security/cve/cve-2025-68973
> To mitigate this issue, users should avoid processing untrusted or unverified input with GnuPG.
Before verifying a signature with GnuPG use some secure scheme to verify authenticity? 🙂🙃🙂🙃

Beyond the underlying mathematics of cryptographic algorithms, there is a whole other layer of implementation code, assigning meaning to the processed data. For example, a signature verification operation both needs robust cryptography **and** ass...