On 06/10/2014 05:03 PM, Tom Ritter wrote:
I just want to jump in and mention again that it's entirely possible
to pick apart applications written for Android, iPhone, Windows, Mac,
etc and understand how they operate. Going even deeper than just
'what they store on disk' and 'what they send
Seems like a good idea. I wonder what journalists on the list think
about it. I know there are a number of Knight Fellows and other
journalists on the list, so I hope they chime in.
BTW, here is the press release received via Twitter in response to an
inquiry about Wickr's security:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 6/9/2014 8:42 PM, Yosem Companys wrote:
Wickr is back in the news in spectacular form:
http://www.inc.com/magazine/201407/ceo-of-wickr-leads-social-media-resistance-movement.html
...despite known security problems we've discussed on the
Le 10/06/2014 16:19, Joshua Kopstein a écrit :
I get pitched on the latest magic email encryption
snakeoil regularly.
That's not magic but the initial idea of Peersm was to exchange
encrypted data anonymously inside browsers (so from any device, no
installation) without any third party in
From: m d 2md...@gmail.com
The term open source was missing from the article. I'm curious if any of
the other projects mentioned are open source like Indie Box, other than
Diaspora.
The mention of NDAs by the Wickr founder makes it a non-starter. Their web
site doesn't have any download link for
From: Brian Behlendorf br...@behlendorf.com
You don't have to; trust, but verify. Or trust those who *can* verify.
Microsoft, Google and Apple are at the top of the most trusted brands
lists and have been for years, so even in the light of the Snowden
revelations, most have tended to give them
I have to say: I'm not as uncomfortable with this article as I thought I'd
be. I'm definitely uncomfortable with some of Wickr's promotional text
(military-grade encryption, leave no trace) but I felt that this
particular article addressed the NSA concerns and was fairly realistic
about what
I just want to jump in and mention again that it's entirely possible to
pick apart applications written for Android, iPhone, Windows, Mac, etc and
understand how they operate. Going even deeper than just 'what they store
on disk' and 'what they send on the wire'. It requires a little bit of
I'll echo Tom: It's relatively easy and a good learning exercise to pick
apart mobile apps and see what they're doing. On that note, here's some
source generated from the Wickr Android app class files using jd-gui:
http://saweis.net/files/wickr.src.zip
That doesn't include a native library that
Wickr is back in the news in spectacular form:
http://www.inc.com/magazine/201407/ceo-of-wickr-leads-social-media-resistance-movement.html
...despite known security problems we've discussed on the list before:
https://mailman.stanford.edu/pipermail/liberationtech/2012-June/004239.html
Seems as
Hey Yosem!
A good experiment might be to send out releases of factual security info to
counteract the dubious press releases that all too often turn into dubious
articles.
Yosem Companys wrote:
Seems as though we need better tactics to share with journalists our
impressions about
On Mon, Jun 9, 2014 at 10:41 PM, Griffin Boyce grif...@cryptolab.net
wrote:
A good experiment might be to send out releases of factual security info
to counteract the dubious press releases that all too often turn into
dubious articles.
I think it'd be pretty interesting for the
12 matches
Mail list logo