"boolean do Action Today()"), I implement it via a version that takes an arbitrary date (e.g. It's dangerous to do that for code that require a secure PRNG, since you don't want to be one configuration error away from replacing your random number source with a mock random number source that always returns the same numbers.As a result, we are left completely in the dark when it comes to end-to-end testing to verify that our production systems are configured securely.
• February 25, 2015 PM To nitpick, you may want to change that link to https lest you surreptitiously weaken a cryptographic system yourself.
• February 25, 2015 AM Re: "they" might have better cryptography"? See: Neville Chamberlain (kids, don't be like him).
I am curious how "they" managed to entirely corrupt, degrade and sabotage our democratic representative government to the point of impotence.
That skirts around the issue entirely for many algorithm and protocol implementations.
Plus, the people doing the porting don't have to be experts on cryptography or protocols.I'd also like to repeat something I've proposed in the past: modularizing the protocols.