First, xmux: I want to sincerely thank you for participating in this
conversation. I really respect your expertise (and your strong familiarity
with a side of this debate) and I strongly hope that you will remain a
contributor to this conversation. Much better than bitter tweeting!

I want to point out two things here:

   1. Cryptocat's goal is to find the best balance between
   accessibility/usability and security.
   2. Cryptocat does not mean to compete with GPG, it means to replace *
   plaintext.*

Now, I want you to consider the following paragraph *in light of the two
conditions outlined above:*
I have recognized the security advantages of having a browser plugin by
default, which is why if you look at the proposed new Cryptocat web splash
page (http://i.imgur.com/Y56I7.png) the "web" version is only *a
barely *visible
option in comparison to the browser plugin. And I must stress that the web
version will have a *huge* warning that cannot be hidden, in the form of a
big red bar in the user's language literally beseeching them to install the
local browser plugin.

NK


On Mon, Aug 6, 2012 at 6:08 PM, Eleanor Saitta <e...@dymaxion.org> wrote:

> On 2012.08.06 17.51, Jacob Appelbaum wrote:
> > Jillian C. York:
> >> It's difficult.  I'm not a technologist, but I understand the issues and
> >> the user needs well.  My "type," I'd surmise, is few and far between.
> >>
> >> Security experts have obvious reasons for being conservative, and I get
> >> that.  Nevertheless, there are a lot of users who would benefit from *a
> >> little bit* of added security.  The question, then, as I see it, is:
> >>
> >> *How do we provide that little bit while still making users aware of
> risks?*
> >
> > The problem is that the little bit is effectively zero.
> >
> > What's the difference between Facebook chat over SSL and Cryptocat over
> SSL?
> >
> > Without a browser extension/plugin - there is little to no difference.
> >
> > You have to trust the server and the server operator to not be a bad
> > actor in both cases.
>
> It is true that you have to trust the server operator in both cases.
> However, having a server configuration which does not completely
> compromise user privacy (vs. the operator) by default, like Facebook
> does, is still a significant improvement in many use cases, as is the
> ability to have a diversity of server operators.
>
> If you insist on only permitting tools which offer a mythical "perfect"
> standard of security, you ensure that many at risk users will use
> plaintext tools that offer no security at all.
>
> Yes, it is likely that cryptocat will be broken in a non-plugin version,
> and that people will die because of it.  However, it is also likely that
> cryptocat will save lives, vs. plaintext alternatives, and that a plugin
> version of cryptocat will also be broken at some point, and that people
> will die because of that.
>
> We need an ecosystem of tools, not a magic bullet.  The Security
> Community as such has done much good over the years.  However, security
> professionals who are unwilling to acknowledge that different users have
> different needs, that online security exists within a larger
> constellation of risk analysis, and that usability can and often does
> trump pure security even when viewed purely through risk analysis and
> outcomes are doing a grave disservice to both their field and their users.
>
> It has been 21 years since PGP was released.  To this day, it remains a
> niche product at best.  Users with real world security concerns rarely
> if ever use encrypted email.  It is exactly this attitude which is to
> blame.
>
> If you want to continue being irrelevant, go right ahead.  The rest of
> us have real world problems to solve.
>
> E.
>
> --
> Ideas are my favorite toys.
>
>
> _______________________________________________
> liberationtech mailing list
> liberationtech@lists.stanford.edu
>
> Should you need to change your subscription options, please go to:
>
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
>
> If you would like to receive a daily digest, click "yes" (once you click
> above) next to "would you like to receive list mail batched in a daily
> digest?"
>
> You will need the user name and password you receive from the list
> moderator in monthly reminders. You may ask for a reminder here:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
>
> Should you need immediate assistance, please contact the list moderator.
>
> Please don't forget to follow us on http://twitter.com/#!/Liberationtech
>
_______________________________________________
liberationtech mailing list
liberationtech@lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click "yes" (once you click above) 
next to "would you like to receive list mail batched in a daily digest?"

You will need the user name and password you receive from the list moderator in 
monthly reminders. You may ask for a reminder here: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech

Reply via email to