Before I recreate the wheel - anyone have a good reference on material explaining to people what a Gmail security model vs a PGP end-to-end model "looks like" to the ~outside~?
It's be easy to make slight of it in NSA terms but I'm trying to get a realistic depiction of what the "designed" models were to then explain how they break down to various user sets. Thanks, -Ali
-- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at [email protected] or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
