Ya gotta love it. Or something like that....
Hence the importance of deeply embedding strong encryption in all communications, as Apple is doing. Normalize the usage such that simply using it isn’t sufficient grounds for inferring anything about the user.
There are some who use Mixmaster or Cyberpunk. The NSA may know where the mail originates, but they don’t know where it is going or who reads it.
Thus the need to put it everywhere by default or at least widespread. Not that I’m hoping terrorists should be able to hide (except that the Feral goobermint considers anyone normal a terrorist), but privacy is a basic human right, Robert Bork be damned.
Article awhile back mentioned something about Tor having been taken over by the feds?
what exactly is wrong with PGP?
please e specific.
don’t just say it sucks, or has a backdoor.
my understanding is that the
PGP sourcecode was open,
or maybe that was a long time ago.
The theory, if my memory of 20 years ago is still good, was that encryption use should be universally adopted specifically to keep use of encryption from flagging someone as suspicious.
As it is, it’s the digital equivalent of driving a candy-apple red Ferrari; whether you speed or not, every cop’s eyes are on you. (BTW green Ninjas work the same way at a somewhat lesser cost).
I'm assuming if this is being made public that the bad guys already know... Shame... it's a great system allowing people to self identify as terrorists - or people with 'something to hide'...
It's odd then that Edward Snowden insisted on communicating with the Guardian's Glenn Greenwald using PGP. Link goes to Huffington Post.
This article is complete garbage. They make it seem like the Feds are all over things, and they really aren’t. The use of TOR is growing, and identifying the ingress and egress points, plus the client information, is not hard. All they have are IP addresses and information on computer types, MAC addresses, etc. They do not have the ability to detect what is being passed in those channels.
The same goes for VPN. Do you know how many companies use VPN technologies? It’s one of the fundamental things for any admin to know how to implement and maintain whether it’s using a turnkey appliance from Cisco, implementing an IKEv2 or L2TP VPN with Microsoft Windows Server, or installing OpenVPN on a Nix machine. They’re collecting metadata on VPN traffic? BFD! I could show you packet traces from the nearest Starbucks where thousands of people are sending traffic across UDP 500, 1500, and 1701 every hour, day, week, etc. IT MEANS NOTHING!
This is another rah-rah article for the Feds making it seem like they can track everyone, and while I agree that privacy is pretty much in the toilet, browsing securely online is very possible. The most the government or the bad guys will have is that A) you are using encryption technology and B) traffic is between you and another point. They don’t know if you’re sending emails with recipes for duck l’orange or blueprints for a 3D-printed gun.
And as far as PGP... it’s “pretty good.” That’s all. It’s not great.