Here's a stark reminder that any #backdoor is a #vulnerability:
"China-based hackers used a stolen sign-in key" to hack into US government's #Microsoft email accounts.
That's why we at Tutanota fight for strong encryption - without any backdoor. 🔒
Here's a stark reminder that any #backdoor is a #vulnerability:
"China-based hackers used a stolen sign-in key" to hack into US government's #Microsoft email accounts.
That's why we at Tutanota fight for strong encryption - without any backdoor. 🔒
Murray
in reply to Tuta • • •Network is reliable
in reply to Tuta • • •Even as you say that encryption takes place on device locally, device needs a way to get a public key of recipient. How does device do that? Right! By asking the server! But why the client should trust that it's really original key of recipient and not the replaced one by your server, guys?
Every really secure e2e messenger has a way to verify authenticity of second party. But your application has nothing to solve this.
MaDRuK_KaRTaLı¹⁹⁰³
in reply to Tuta • • •iyidir hoştur güvenilir:)
@Proton.me de önerelim.
😎