-
-
Replying to @rknLA1 reply 0 retweets 0 likes
-
Replying to @Dymaxion
@Dymaxion@schuyler@rknLA @gullikr@smarimc You may be interested to read: http://blog.agilebits.com/2013/03/06/you-have-secrets-we-dont-why-our-data-format-is-public/ … E2EE: http://learn.agilebits.com/1Password4/Security/keychain-design.html …3 replies 0 retweets 0 likes -
Replying to @1Password
@1Password@Dymaxion@schuyler@rknLA@smarimc right now i feel like if you have offices in 5 eyes you don't even know if your safe :(3 replies 0 retweets 0 likes -
Replying to @quinnnorton
@quinnnorton@1password@dymaxion@schuyler@rknla@smarimc How to defend against NSA HumInt efforts to weaken closed-source crypto?2 replies 0 retweets 0 likes -
Replying to @inthecloud247
@inthecloud247@1password@dymaxion@schuyler@rknla@smarimc atm? You don't. :( but you aren't always facing the NSA or equiv.1 reply 0 retweets 0 likes -
Replying to @quinnnorton
@quinnnorton@1password@dymaxion@schuyler@rknla@smarimc prolly 1password & others would need regular 3rd party crypto code audits?2 replies 0 retweets 0 likes -
Replying to @inthecloud247
@inthecloud247@quinnnorton@1password@dymaxion@schuyler@rknla@smarimc and track crypto vulns on per-employee basis 2 find mole?3 replies 0 retweets 0 likes -
Replying to @inthecloud247
@inthecloud247@quinnnorton@schuyler@rknla@smarimc Nah, likely counterproductive in most cases and won't work if there is one.1 reply 0 retweets 0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.