Jens Christian Hillerup <j...@hillerup.net> writes:
>So what do we do about this? Opening the source code as an argument
>for security no longer suffices. How can we raise money for rigid and
>independent quality assurance of software that in this case is
>designed to potentially saving lives? And how can we make sure that
>this money flows into the fund and out to the QAers on a regular
>basis?

For what it's worth: OpenITP's Peer Review Board [1] is intended to help
with exactly this.  It's under development; Eleanor Saitta on this list
can give a better sense of where things stand at this point, but I
wanted to let you know the effort is under way.

By the way, I don't agree with the original blog post's [2] ad hominem
remarks about Cryptocat's developers.  The most popular programs are
always where people are most excited to find bugs.  It's therefore hard
to compare Cryptocat's development against that of other security
projects, given that many of those projects are not as popular as
Cryptocat -- in other words, it's hard to establish what the baseline is
or should be.  So I wish people would be more circumspect about flinging
around words like "incompetent"; it just sets a bad tone and doesn't
help anything.  Cryptocat's response [3] is exemplary.

-Karl

[1] http://wiki.openitp.org/peerreviewboard:start
[2] http://tobtu.com/decryptocat.php
[3] 
https://blog.crypto.cat/2013/07/new-critical-vulnerability-in-cryptocat-details/
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to