I'm finding this discussion highly illuminating -- as I find many here.
So before I make my comments, I want to says thanks to everyone for the
education. You've given me *a lot* to think about while running.
My concerns re these sorts of self-destructing documents revolve (first)
around the
Brian Conley:
Apparently Silent Circle is also proposing such a feature now.
Such a feature makes sense when we consider the pervasive world of
targeted attacks. If you compromise say, my email client today, you may
get years of email. If you compromise my Pond client today, you get a
weeks
It's highly concerning to me that the rhetoric has shifted from actual
security concerns such as auditing to whether a message deletion
feature is useful.
NK From: Jacob Appelbaum
Sent: 2013-02-05 2:13 PM
To: liberationtech@lists.stanford.edu
Subject: Re: [liberationtech] Wickr app aims
Seems rather reasonable, really. Hardly malware but hardly perfect.
Perhaps I am missing something, but isn't the point of contention that
Wickr and Silent Circle are promising trust in the destruction of messages
on the receiver side, which as far as I am aware is an improbable claim?
Again,
On 2/5/2013 11:11 AM, Jacob Appelbaum wrote:
Brian Conley:
Apparently Silent Circle is also proposing such a feature now.
Such a feature makes sense when we consider the pervasive world of
targeted attacks. If you compromise say, my email client today, you may
get years of email. If you
Daniel Colascione:
On 2/5/2013 11:11 AM, Jacob Appelbaum wrote:
Brian Conley:
Apparently Silent Circle is also proposing such a feature now.
Such a feature makes sense when we consider the pervasive world of
targeted attacks. If you compromise say, my email client today, you may
get years
My impression is that this could work in any system that delivers encrypted
messages to a third-party non SMS client. In fact, it could work in an SMS
client as well, though an encrypted version of the message would of course
be stored by the mobile service provider.
As Jacob says its certainly
Just to clarify, are you suggesting such a feature would put the users at
*greater* threat?
in my experience simply using CryptoTool™ puts you at risk of
interrogation, torture, prison in certain countries. It seems that such a
feature would mitigate. On the other hand, it seems like splitting
On Tue, Feb 5, 2013 at 4:13 PM, Brian Conley bri...@smallworldnews.tvwrote:
Just to clarify, are you suggesting such a feature would put the users at
*greater* threat?
No: As mentioned in my previous email, I'm trying to point out that when
features like this are introduced, it's definitely
uncrackable? self-destruct? patent pending? decoy images?
Riiight.
---rsk
--
Unsubscribe, change to digest, or change password at:
https://mailman.stanford.edu/mailman/listinfo/liberationtech
On 02/03/2013 08:42 PM, Rich Kulawiec wrote:
uncrackable? self-destruct? patent pending? decoy images?
Riiight.
The sad thing is, that until I read this story, I had a very positive
feeling about Wickr, and, even with its closed codebase, thought it
could be a good solution for iOS users
Wickr app aims to safeguard online privacy
February 3, 2013, 4:33 am AFP
SAN FRANCISCO (AFP) - Wickr co-founder Nico Sell is working toward
geek utopia, a world where people hold the power when it comes to
who sees what they share on the Internet or from their phones.
The startup's services --
..on Sun, Feb 03, 2013 at 09:53:23AM +0700, Nathan of Guardian wrote:
Wow, a patent-pending closed-source app for Freedom(tm) only available on
iPhones!
All of our problems are solved. ;)
Indeed.
Maybe it'd all be so much cleaner if we simply removed the right to Freedom of
Association,
The combination of tall claims, egotistical behaviour and closed-source,
unreviewed software should be enough to make any reasonable security expert
implore everyone to steer clear from Wickr.
NK
On Sat, Feb 2, 2013 at 10:39 PM, Julian Oliver jul...@julianoliver.comwrote:
..on Sun, Feb 03,
I wonder if Chris Soghoian will ask journalists to stop hyping unproven,
closed-source, over-hyped security tools like Wickr. :-)
NK
On Sat, Feb 2, 2013 at 10:48 PM, Nadim Kobeissi na...@nadim.cc wrote:
The combination of tall claims, egotistical behaviour and closed-source,
unreviewed
15 matches
Mail list logo