-
-
Replying to @Dymaxion
@Dymaxion@schuyler@rknLA @gullikr@smarimc You may be interested to read: http://blog.agilebits.com/2013/03/06/you-have-secrets-we-dont-why-our-data-format-is-public/ … E2EE: http://learn.agilebits.com/1Password4/Security/keychain-design.html …3 replies 0 retweets 0 likes -
Replying to @1Password
@1Password@schuyler@rknLA @gullikr@smarimc But if your software isn't open source, I can't verify that it does what you say.1 reply 0 retweets 0 likes -
Replying to @jpgoldberg
@jpgoldberg@schuyler@rknLA @gullikr@smarimc In general, I can't recommend people use closed source software for high-value use cases.1 reply 0 retweets 0 likes -
Replying to @jpgoldberg
@jpgoldberg It's necessary there too, because we get assurance one piece at a time. We're finding out how critical FOSS OS's are, though.1 reply 0 retweets 0 likes -
Replying to @jpgoldberg
@jpgoldberg Yeah - because while it may take another decade to finish the transition, eventually we need to be open across the whole stack.1 reply 0 retweets 0 likes
@jpgoldberg @dymaxion as threat increases, need more regular audits. can also have ongoing code review contracts w/multiple 3rd parties
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.