On 04/24/2014 03:09 PM, Zooko Wilcox-OHearn wrote: > Therefore if a government, or a murderous mafia, compelled us to > cooperate with them, we would then say "Well… okay, but… have you > figured out how your target users acquires the software? Because, you > know, if they're getting it from Debian, or from Tails, or something, > then there's not a whole lot we can do to help you backdoor your > target users…". This is the same approach we've taken with Ostel.co and OSTN - we provide a service, but clients like Jitsi, CSipSimple, Linphone, etc come from other free-software sources. It is counter-intuitive in this age of a unified vendor for the app and service stack.
Some people say that makes our usability poor, but if you consider "not being backdoored" as part of usability, then I think we do just fine. Keep up the excellent work, Zooko. +n -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at [email protected].
