[Cryptography] Zoom publishes draft cryptographic design for end-to-end encryption

John Gilmore gnu at toad.com
Thu Jun 4 00:22:28 EDT 2020


John Young <jya at pipeline.com> wrote:
> In response to these critiques, isn't it wise to suspect/avoid any 
> comsec/infosec which is widely touted, used and promoted ... ?

That sounds like the club that was so crowded that nobody goes there anymore.

I *have* been advised by someone who ought to know better, that merely
moving off the most popular two or three platforms vastly reduces the
likelihood of penetration.  Like, don't use a Microsoft or Apple OS.
But: you have to think about who might want to attack and what their
goals are.  If breaking into servers is what matters to one of your top
adversaries, then Linux is likely the first platform attacked; if
smartphones, Android; etc.

	John  (hat-tip to Yogi Berra)



More information about the cryptography mailing list