[Cryptography] The crypto behind the blackphone

Phillip Hallam-Baker hallam at gmail.com
Mon Jan 27 17:40:00 EST 2014


On Mon, Jan 27, 2014 at 4:01 PM, Jon Callas <jon at callas.org> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On Jan 27, 2014, at 9:24 AM, Daniel Cegiełka <daniel.cegielka at gmail.com>
> wrote:
>
> >
> > What gives you the use of cryptography, if your phone is factory
> > built-in backdoor (baseband)? Until not solve this problem, you can
> > not say that Blackphone is really safe.
>
> I would *never* say that it is safe.
>
> Okay, okay, after the Drudge Report called us NSA-proof, I was given a
> chocolate bar in the shape of a cell phone, and said that *that* was
> NSA-proof blackness and comes in plain or milk. There was an entertaining
> twitterstorm following, which was lots of fun.


As Robert Morris used to say, the three laws of computer security

1) Don't have a computer
2) If you have a computer, don't turn it on
3) If you turn it on, don't use it

-- 
Website: http://hallambaker.com/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20140127/44d3b66b/attachment.html>


More information about the cryptography mailing list