Before I recreate the wheel - anyone have a good reference on material
explaining to people what a Gmail security model vs a PGP end-to-end model
"looks like" to the ~outside~?

It's be easy to make slight of it in NSA terms but I'm trying to get a
realistic depiction of what the "designed" models were to then explain how
they break down to various user sets. Thanks, -Ali
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at [email protected] or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to