Conversation
Notices
-
reality karen teaduck III (reality@quitter.se)'s status on Friday, 03-Mar-2017 13:12:46 UTC reality karen teaduck III surprisingly adroit discussion of how to message securely etc from teen vogue http://ur1.ca/ql68k -
reality karen teaduck III (reality@quitter.se)'s status on Friday, 03-Mar-2017 14:04:29 UTC reality karen teaduck III @strypey read on my friend In conversation permalink -
reality karen teaduck III (reality@quitter.se)'s status on Friday, 03-Mar-2017 14:38:11 UTC reality karen teaduck III @strypey no it doesn't. they're talking about evaluating your threat model, as in actual security field http://ur1.ca/ql6ik In conversation permalink Attachments
-
reality karen teaduck III (reality@quitter.se)'s status on Friday, 03-Mar-2017 14:39:30 UTC reality karen teaduck III @strypey though of course it would be helpful to mention limitations/lack of trust in non os solutions In conversation permalink -
reality karen teaduck III (reality@quitter.se)'s status on Friday, 03-Mar-2017 14:49:00 UTC reality karen teaduck III @strypey no, they make it a dichotomy between using more convenient sw & sharing metadata, and using less convenient sw w/ more security In conversation permalink -
reality karen teaduck III (reality@quitter.se)'s status on Friday, 03-Mar-2017 14:49:50 UTC reality karen teaduck III @strypey and you can decide based on your security needs, or threat model In conversation permalink -
reality karen teaduck III (reality@quitter.se)'s status on Friday, 03-Mar-2017 14:50:28 UTC reality karen teaduck III @strypey yeah and i really don't trust their encryption model. idk what possessed them to reinvent the wheel with that one In conversation permalink -
reality karen teaduck III (reality@quitter.se)'s status on Friday, 03-Mar-2017 14:55:02 UTC reality karen teaduck III @strypey sure, but the greater concept still relevant to decision re particular dichotomy. i'm just glad there was no misinformation In conversation permalink
-