On Wed, Nov 7, 2012 at 3:17 AM, Griffin Boyce griffinbo...@gmail.com wrote:
Has anyone asked Tim Berners-Lee about child pornography lately? Cell
phones are used by drug dealers, and my dicing knife doubles as a deadly
weapon. There's a world of difference between the inventor's intended
use
Nadim
I understand your position, but actions like this website won't help
your cause.
Can you understand how actions like setting up this web site might be
viewed as a way to call attention to oneself, rather than champion the
(respectable) ideals of the open source movement?
--
Greg Norcie
It's not just me who interprets it that way - the only reason I responded
was that after Nadim's first post I was approached by former colleagues who
are still in the DoD circles. They all wondered if these complaints, that
seemed awfully specific to ~one~ player in the industry, were born from
Ali,
Of course I would publicize my complaints. That's how you get your voice
heard. I repeat that my only concern here if Silent Circle shipping
questionably secure software and going against the open sourcing of
cryptography software. I don't care if it's, as you say a bit of 'look at
me!', This
OK - now we actually have a detail disagreement.
Please show me evidence of Silent Circle malpractice..
That's a big leap from disagreeing with a practice or declaring a best
practice as you see fit and negligence or even blatant disregard.
Context matters.
-Ali
On Tue, Nov 6, 2012 at 2:22
On Tue, Nov 06, 2012 at 02:28:36PM -0500, Nadim Kobeissi wrote:
I believe that releasing closed-source, unreviewed and centralized crypto
software and then marketing it as secure to be malpractice. That is simply
my point.
I stopped looking at SilentCircle when I was looking through their
FAQ:
The full response in the FAQ is: Yes it is. Silent Phone uses
Device-to-Device encryption technology so that only the users have the keys
exchanged on their device for each call peer-to-peer….the keys are not held
on a server. Silent Phone uses TLS and the ZRTP protocols to encrypt the
packets of
Maxim Kammerer:
publicly acknowledge the currently primary use
of hidden services
Please enlighten us all about the primary use of hidden services.
--SiNA
--
“Be the change you want to see in the world.” Gandhi
OTR: i...@jabber.ccc.de
a5dae15f45a37e9768f6deae7b54807fc4942ec9
--