On Feb 19, 2011, at 12:00 PM, Patrice Brend'amour wrote:
>> Presumably secure computer is right.  Take, for example, a feature as 
>> innocuous as keeping my time in sync.  Apple can pretty much track where in 
>> the world because I'm connected to their time server.  Crazy, right.
> If you don't use another NTP Server

Obviously.

My point is this: most people don't think twice about something as fundamental 
as the computer telling you the right time.  That basic feature, enabled 
out-of-the-box, is enough to give you away. 

Now consider all the closed source applications (and platforms when it comes to 
mobiles) and the potential for privacy invasion is endless.

> (as I do) or have your own.

You just reinforced my point: "roll-your-own" vs. "out-of-the-box simplicity 
and cookie cutter experience."

-Roberto.

> Patrice
> Am 19.02.2011 um 20:57 schrieb Roberto Aguilar:
> 
>> On Feb 19, 2011, at 3:28 AM, Raphael 'kena' Poss wrote:
>>> On Wed, 16 Feb 2011 22:05 -0800, "Curtis Ward" <[email protected]>
>>> wrote:
>>>> I beg you for one now.
>>> 
>>> You seem to be confused about security. Your stated needs for
>>> confidentiality conflict with your desire for  an out-of-the-box
>>> solution. Do you realize that any phone manufacturer / mobile carrier
>>> can sell phones that can be remotely controlled? This risk exists even
>>> more for iOS than Android, since neither the operating system nor device
>>> specification are open for scrutiny. Even with a GPG-aware mail client
>>> someone could well monitor your key presses or screen remotely.
>> 
>> You made an excellent choice in phones if you were looking for 
>> out-of-the-box simplicity and cookie cutter experience.  Encryption, 
>> security, and privacy are not cookie cutter; they usually require 
>> roll-your-own solutions.  Android may be better for that; one solution for 
>> that platform I found is from Whisper systems:
>> 
>> http://www.whispersys.com/
>> 
>>> In short, don't use your mobile phone directly for secure communication.
>>> The best you can get is tethering, ie connect your computer to a network
>>> using the mobile phone as a network interface. Then you can tunnel
>>> secure channels on top of this using your (presumably secure) computer.
>> 
>> Presumably secure computer is right.  Take, for example, a feature as 
>> innocuous as keeping my time in sync.  Apple can pretty much track where in 
>> the world because I'm connected to their time server.  Crazy, right.
>> 
>> -Roberto.
>> 
>>> -- 
>>> Raphael 'kena' Poss
>>> 
>>> _______________________________________________
>>> gpgtools-users mailing list
>>> [email protected]
>>> FAQ: http://www.gpgtools.org/faq.html
>>> Changes: http://lists.gpgtools.org/mailman/listinfo/gpgtools-users
>>> Unsubscribe: 
>>> http://lists.gpgtools.org/mailman/options/gpgtools-users/[email protected]?unsub=Unsubscribe&unsubconfirm=1
>>> 
>>> This email sent to: [email protected]
>> 
>> _______________________________________________
>> gpgtools-users mailing list
>> [email protected]
>> FAQ: http://www.gpgtools.org/faq.html
>> Changes: http://lists.gpgtools.org/mailman/listinfo/gpgtools-users
>> Unsubscribe: 
>> http://lists.gpgtools.org/mailman/options/gpgtools-users/[email protected]?unsub=Unsubscribe&unsubconfirm=1
>> 
>> This email sent to: [email protected]
> 
> _______________________________________________
> gpgtools-users mailing list
> [email protected]
> FAQ: http://www.gpgtools.org/faq.html
> Changes: http://lists.gpgtools.org/mailman/listinfo/gpgtools-users
> Unsubscribe: 
> http://lists.gpgtools.org/mailman/options/gpgtools-users/[email protected]?unsub=Unsubscribe&unsubconfirm=1
> 
> This email sent to: [email protected]

_______________________________________________
gpgtools-users mailing list
[email protected]
FAQ: http://www.gpgtools.org/faq.html
Changes: http://lists.gpgtools.org/mailman/listinfo/gpgtools-users
Unsubscribe: 
http://lists.gpgtools.org/mailman/options/gpgtools-users/[email protected]?unsub=Unsubscribe&unsubconfirm=1

This email sent to: [email protected]

Reply via email to