@ggreenwald Tor's the only privacy project that receives anything approaching serious funding. But it's very vulnerable to targeted attacks.
-
-
Replying to @matthew_d_green
@ggreenwald I have no issues with Tails, but they work on a shoestring. Meanwhile other privacy projects like Truecrypt have gone away.2 replies 5 retweets 4 likes -
Replying to @matthew_d_green
@ggreenwald OTR and GnuPG need to be completely re-designed and re-written. I'll stop now.8 replies 9 retweets 11 likes -
Replying to @matthew_d_green
@matthew_d_green see also: TLS and all of its associated libraries, and X.509 while we’re at it. Anything infected with ASN.11 reply 0 retweets 1 like -
Replying to @bascule
@bascule@matthew_d_green Go TLS stack is not too bad (though incomplete). a good example of enduser crypto (sec + Ui wise):@whispersystems2 replies 0 retweets 0 likes -
Replying to @a_z_e_t
@a_z_e_t@matthew_d_green@whispersystems Go TLS stack can only help Go though. Go is a managed language runtime averse to embedding1 reply 0 retweets 1 like -
Replying to @bascule
@bascule@matthew_d_green i agree - that wasn't my point. did any of you look into botan or polarssl by the way? doesn't seem too bad.2 replies 0 retweets 0 likes
@a_z_e_t @matthew_d_green yes, we’re using PolarSSL, although the code quality isn’t notably better. BoringSSL is interesting though
-
-
Replying to @bascule
@bascule@matthew_d_green not sure if I'd use it outside of google without paid developers looking at the changing codebase.0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.