@bascule @Cryptomeorg Every security is deceptive. It's business. You may use the tools provided - but you can not trust.
-
-
-
.
@_cypherpunks_@Cryptomeorg Do you have locks on your doors? Do you know they can be picked? Why bother with locks? Remove them!
End of conversation
New conversation -
-
-
@bascule@Cryptomeorg@_cypherpunks_ depends.. sometimes you FEEL like leaking deliberately trick is to make it convincing! -
@bascule@Cryptomeorg@_cypherpunks_ depends on operational requirements :) -
@hotelzululima@Cryptomeorg@_cypherpunks_ yes the NSA loves your unauthenticated plaintexts -
@bascule@Cryptomeorg@_cypherpunks_ besides running on an older version of OSX Lion, NSA TAO probably owns my file handles anyway -
@hotelzululima@Cryptomeorg@_cypherpunks_ they're owning you through any unauthenticated software update delivered via malleable plaintext -
@bascule@Cryptomeorg@_cypherpunks_ and all other updates obtained via 3rd party channels etc -
@hotelzululima@Cryptomeorg@_cypherpunks_ that's exactly what I'm talking about... software that grabs unauthenticated code via port 80 -
@bascule@Cryptomeorg@_cypherpunks_ but honestly https is NOT that much more protection with the CA system busted/penetrated - 5 more replies
New conversation -
-
-
.
@Cryptomeorg if you like unauthenticated plaintext so much, maybe you should change your name to plaintexttomeThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.