On Feb 19, 2011, at 12:00 PM, Patrice Brend'amour wrote: >> Presumably secure computer is right. Take, for example, a feature as >> innocuous as keeping my time in sync. Apple can pretty much track where in >> the world because I'm connected to their time server. Crazy, right. > If you don't use another NTP Server
Obviously. My point is this: most people don't think twice about something as fundamental as the computer telling you the right time. That basic feature, enabled out-of-the-box, is enough to give you away. Now consider all the closed source applications (and platforms when it comes to mobiles) and the potential for privacy invasion is endless. > (as I do) or have your own. You just reinforced my point: "roll-your-own" vs. "out-of-the-box simplicity and cookie cutter experience." -Roberto. > Patrice > Am 19.02.2011 um 20:57 schrieb Roberto Aguilar: > >> On Feb 19, 2011, at 3:28 AM, Raphael 'kena' Poss wrote: >>> On Wed, 16 Feb 2011 22:05 -0800, "Curtis Ward" <[email protected]> >>> wrote: >>>> I beg you for one now. >>> >>> You seem to be confused about security. Your stated needs for >>> confidentiality conflict with your desire for an out-of-the-box >>> solution. Do you realize that any phone manufacturer / mobile carrier >>> can sell phones that can be remotely controlled? This risk exists even >>> more for iOS than Android, since neither the operating system nor device >>> specification are open for scrutiny. Even with a GPG-aware mail client >>> someone could well monitor your key presses or screen remotely. >> >> You made an excellent choice in phones if you were looking for >> out-of-the-box simplicity and cookie cutter experience. Encryption, >> security, and privacy are not cookie cutter; they usually require >> roll-your-own solutions. Android may be better for that; one solution for >> that platform I found is from Whisper systems: >> >> http://www.whispersys.com/ >> >>> In short, don't use your mobile phone directly for secure communication. >>> The best you can get is tethering, ie connect your computer to a network >>> using the mobile phone as a network interface. Then you can tunnel >>> secure channels on top of this using your (presumably secure) computer. >> >> Presumably secure computer is right. Take, for example, a feature as >> innocuous as keeping my time in sync. Apple can pretty much track where in >> the world because I'm connected to their time server. Crazy, right. >> >> -Roberto. >> >>> -- >>> Raphael 'kena' Poss >>> >>> _______________________________________________ >>> gpgtools-users mailing list >>> [email protected] >>> FAQ: http://www.gpgtools.org/faq.html >>> Changes: http://lists.gpgtools.org/mailman/listinfo/gpgtools-users >>> Unsubscribe: >>> http://lists.gpgtools.org/mailman/options/gpgtools-users/[email protected]?unsub=Unsubscribe&unsubconfirm=1 >>> >>> This email sent to: [email protected] >> >> _______________________________________________ >> gpgtools-users mailing list >> [email protected] >> FAQ: http://www.gpgtools.org/faq.html >> Changes: http://lists.gpgtools.org/mailman/listinfo/gpgtools-users >> Unsubscribe: >> http://lists.gpgtools.org/mailman/options/gpgtools-users/[email protected]?unsub=Unsubscribe&unsubconfirm=1 >> >> This email sent to: [email protected] > > _______________________________________________ > gpgtools-users mailing list > [email protected] > FAQ: http://www.gpgtools.org/faq.html > Changes: http://lists.gpgtools.org/mailman/listinfo/gpgtools-users > Unsubscribe: > http://lists.gpgtools.org/mailman/options/gpgtools-users/[email protected]?unsub=Unsubscribe&unsubconfirm=1 > > This email sent to: [email protected] _______________________________________________ gpgtools-users mailing list [email protected] FAQ: http://www.gpgtools.org/faq.html Changes: http://lists.gpgtools.org/mailman/listinfo/gpgtools-users Unsubscribe: http://lists.gpgtools.org/mailman/options/gpgtools-users/[email protected]?unsub=Unsubscribe&unsubconfirm=1 This email sent to: [email protected]
