Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

From the article:

"Since I started working with Snowden's documents, I have been using GPG, Silent Circle, Tails, OTR, TrueCrypt, BleachBit, and a few other things I'm not going to write about."

My take on that is that the author does not trust all the things he advises us to use, since he relies on other things he is not going to tell us about. Which means he is safe(r), we are not, and wont be, since he wont share.

Great. What use is all that then? None.

BTW, Just read that O2 UK are blocking VPN traffic.....



He is giving suggestions for improving your security, not for perfect security. And one additional way you can improve your security is to not led a potential adversary know all the steps you take - Schneier is high profile, and with an admission he's worked on Snowden document, even more so; there's every reason for him to assume that if he wasn't a direct NSA target before, he is now. It's a trade off.


"BTW, Just read that O2 UK are blocking VPN traffic....."

Where does it say that? I can't find it




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: