On 08/11/13 20:10, Francisco Ruiz wrote:
> Download it from
> its source at https://passlok.site44.com (once you have it once, you
> have it forever), look at it, run it, test it. Get its SHA256 hash from
> its help page and check it. If you’re as paranoid as I am, you can watch
> me reading that hash (with some nice background music to make tampering
> with it more difficult), in this youtube video:
> https://www.youtube.com/watch?v=VHR_w0FCkC0

A few things:

1. I have to *run* it to get the hash of the application from the help
page. That is already a leap of faith to run unverified code.

2. I have to verify the hash code with a spoken message in a youtube
video. The message is spoken by someone I've never met, so how do I
verify that it is you who's saying it and not an actor hired by a spooky
agency? Or just dubbed with a new audio score. Hollowood can do that
without a blink.

3. How can I validate that the youtube url is correct? They are all
gibberish to me. Again could be a fake by some adversary. This mail was
not encrypted and validated.

I do *like* your spoken hash verification mechanism. But for it to work
you need to achieve celebrity status. If someone would announce
SecureBieberMail, there are some people in my surroundings that can
vouch for the identity of the speaker. (web of trust)


> There’s no legal action that can shut down PassLok because it consist of
> pure code, and pure code is speech, protected from government
> interference under the 1^st amendment to the US Constitution.

Theoretically you are correct. In practice, we've seen the value of your
US constitution...


Guido.
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Reply via email to