[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Encrypt iPhone calls app



Dnia czwartek, 31 lipca 2014 23:26:26 David Hill pisze:
> You cannot secure cellphones.

Here, have a read:
https://medium.com/message/81e5f33a24e1

Pay some special attention to this part:

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    â??Most of the world does not have install privileges on the computer they 
are using.â??

That is, most people using a computer in the world donâ??t own the computer they 
are using. Whether itâ??s in a cafe, or school, or work, for a huge portion of 
the world, installing a desktop application isnâ??t a straightforward option. 
Every week or two, I was being contacted by people desperate for better 
security and privacy options, and I would try to help them. Iâ??d start, 
â??Download thâ?¦â?? and then weâ??d stop. The next thing people would tell me was 
that they couldnâ??t install software on their computers. Usually this was 
because an IT department somewhere was limiting their rights as a part of 
managing a network. These people needed tools that worked with what they had 
access to, mostly a browser.

So the question I put to hackers, cryptographers, security experts, 
programmers, and so on was this: Whatâ??s the best option for people who canâ??t 
download new software to their machines? The answer was unanimous: nothing. 
They have no options. They are better off talking in plaintext I was told, â??so 
they donâ??t have a false sense of security.â?? Since they donâ??t have access to 
better software, I was told, they shouldnâ??t do anything that might upset the 
people watching them. But, I explained, these are the activists, organizers, 
and journalists around the world dealing with governments and corporations and 
criminals that do real harm, the people in real danger. Then they should buy 
themselves computers, I was told.

That was it, that was the answer: be rich enough to buy your own computer, or 
literally drop dead. I told people that wasnâ??t good enough, got vilified in a 
few inconsequential Twitter fights, and moved on.

Not long after, I realized where the disconnect was. I went back to the same 
experts and explained: in the wild, in really dangerous situationsâ??â??â??even when 
people are being hunted by men with gunsâ??â??â??when encryption and security fails, 
no one stops talking. They just hope they donâ??t get caught.

    The same human impulse that has kept lotteries alive for thousands of 
years keeps people fighting the man against the long odds. â??Maybe Iâ??ll get 
away with it, might as well try!â??

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-- 
Pozdr
rysiek
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 316 bytes
Desc: This is a digitally signed message part.
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20140804/b9654c53/attachment.sig>