"alleging it was being used by "terrorists" whose main aim was to send each other disparaging messages about a Russian university sports competition"
Since when did saying you fucked someone's mum make you a "terrorist"?
Encrypted email biz ProtonMail has open-sourced the code for its iOS app, having paid for a code audit that says there's nothing wrong with it. Having touted itself for years as the choice of political activists, journalists, dissidents and all the other types of people who make the world a better place, ProtonMail is throwing …
Since when did saying you mucked someone's mum make you a "terrorist"?
A younger posh peace protester invited me to an upper class dinner party, and then mocked me by saying the obvious in front of her young posh pals, that I was old enough to be her father.
"That is very true. Where exactly was your mother living in 1986?"
I honestly said that in cadence, she threw a punch at me but I was expecting it and she missed.
She had punched me earlier after she'd boasted her mum was in Wickerman. She said her mum was one of the nude young girls dancing, and I admitted I'd wanked over her mother on TV when I was a teen. That was a solid punch to my jaw that I should have anticipated in retrospect, but I quickly learned my lesson.
Posh girls. Can't live with them, never really wanted to live with them.
I use Protonmail. I switched so I could ditch Gmail and finally go Google-less. Of course Protonmail's security falls flat the moment you send an email without end-to-end encryption, which is pretty much most, if not all of the time. I'm not convinced any web based email service is foolproof and we're in danger of getting into tin foil hat territory. Using your phone/tablet/computer's default mail app/program is merely convenience rather than offering any security.
Quote: "...Protonmail's security falls flat the moment you send an email without end-to-end encryption..."
So.....not true is you do some encryption yourself BEFORE your email enters the channel. Why rely on someone else...when you can do it yourself?
Example below is an example using an (unpublished) process using linux.words as the basis of a book cipher, plus a little randomisation.
Biting the hand that feeds IT © 1998–2019