On 06/10/2014 05:03 PM, Tom Ritter wrote:
I just want to jump in and mention again that it's entirely possible
to pick apart applications written for Android, iPhone, Windows, Mac,
etc and understand how they operate. Going even deeper than just
'what they store on disk' and 'what they send on
I'll echo Tom: It's relatively easy and a good learning exercise to pick
apart mobile apps and see what they're doing. On that note, here's some
source generated from the Wickr Android app class files using jd-gui:
http://saweis.net/files/wickr.src.zip
That doesn't include a native library that co
I just want to jump in and mention again that it's entirely possible to
pick apart applications written for Android, iPhone, Windows, Mac, etc and
understand how they operate. Going even deeper than just 'what they store
on disk' and 'what they send on the wire'. It requires a little bit of
techn
I have to say: I'm not as uncomfortable with this article as I thought I'd
be. I'm definitely uncomfortable with some of Wickr's promotional text
("military-grade encryption," "leave no trace") but I felt that this
particular article addressed the NSA concerns and was fairly realistic
about what W
From: Brian Behlendorf
You don't have to; "trust, but verify". Or trust those who *can* verify.
Microsoft, Google and Apple are at the top of the "most trusted brands"
lists and have been for years, so even in the light of the Snowden
revelations, most have tended to give them the benefit of the
From: m d <2md...@gmail.com>
The term "open source" was missing from the article. I'm curious if any of
the other projects mentioned are open source like Indie Box, other than
Diaspora.
The mention of NDAs by the Wickr founder makes it a non-starter. Their web
site doesn't have any download link
Le 10/06/2014 16:19, Joshua Kopstein a écrit :
I get pitched on the latest "magic" email encryption
snakeoil regularly.
That's not magic but the initial idea of Peersm was to exchange
encrypted data anonymously inside browsers (so from any device, no
installation) without any third party i
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 6/9/2014 8:42 PM, Yosem Companys wrote:
> Wickr is back in the news in spectacular form:
>
>
http://www.inc.com/magazine/201407/ceo-of-wickr-leads-social-media-resistance-movement.html
>
> ...despite known security problems we've discussed on th
Seems like a good idea. I wonder what journalists on the list think
about it. I know there are a number of Knight Fellows and other
journalists on the list, so I hope they chime in.
BTW, here is the press release received via Twitter in response to an
inquiry about Wickr's security:
https://www
On Mon, Jun 9, 2014 at 10:41 PM, Griffin Boyce
wrote:
> A good experiment might be to send out releases of factual security info
> to counteract the dubious press releases that all too often turn into
> dubious articles.
I think it'd be pretty interesting for the cryptographic community to
prod
Hey Yosem!
A good experiment might be to send out releases of factual security info to
counteract the dubious press releases that all too often turn into dubious
articles.
Yosem Companys wrote:
>Seems as though we need better tactics to share with journalists our
>impressions about securit
Wickr is back in the news in spectacular form:
http://www.inc.com/magazine/201407/ceo-of-wickr-leads-social-media-resistance-movement.html
...despite known security problems we've discussed on the list before:
https://mailman.stanford.edu/pipermail/liberationtech/2012-June/004239.html
Seems as
12 matches
Mail list logo