(no title)
tscs37 | 7 years ago
The entire set of encryption can be easily opened up for inspection and manipulation if all parties agree this is good idea.
tscs37 | 7 years ago
The entire set of encryption can be easily opened up for inspection and manipulation if all parties agree this is good idea.
xg15|7 years ago
Encryption where the user does not control either of the endpoints stacks the odds in favor of developers and against users.
I agree however, that the situation for the web (e.g. everything that lives inside a browser) is still pretty good thanks to the ability to add custom root CAs and general user the browser's debugging and inspection tools.
However, if you try to find out what exactly a mobile app, a game console or an IoT device is doing, you soon find yourself out of luck even if you're the owner of those things.