(no title)
purp | 10 years ago
Q: Is it secure?
A: Security is not binary.
Q: OK, how secure is it?
A: It seems like you just asked that question.
Q: No, the first question was if it's secure,
the second question was how secure is it.
A: Well now that wasn't even a question at all.
Tell you what, if you find an unreported security
vulnerability I'll buy you a beer.
[1] http://trustiosity.com/snow/faq.html
fallat|10 years ago
RyanZAG|10 years ago
The only way to know if something is secure is when it's adopted en-mass and you see if it really was secure or not. You could read the WinXP pamphlet on security back when it was released and it had endless bullet points about how secure it was. It was probably the least secure software in the history of computing based on actual attacks after the fact.
Security isn't something you provide an answer to unless you're selling snake oil. Luckily, it seems most people prefer buying snake oil and are happy to eat up a vendor telling them how secure an utterly untested product is.
Security theory is not something you can understand as a non-technical user anyway.
Swannie|10 years ago
Q: What do you mean "No"? A: We believe we have done a good job in securing it.
Q: So did you do a good job? A: We hope so!
Q: You "hope so", what sort of answer is that? A: Trust us. It's secure. We are not hackers. We don't want to steal your data. We did not put in any back doors. We audited the code ourselves. There are not any kernel level hacks, root kits, or otherwise. This has been tested against a variety of anti-virus scanners and none of them flagged anything. We're very good. Please please trust us?
BuildTheRobots|10 years ago
There is of course the counter argument, that if you're non-technical, you probably shouldn't be trying to implement a cryptographic layer-3 network for any reason other than "the lols".
tomtomtom777|10 years ago
boomshucka|10 years ago
chrisdevereux|10 years ago
homulilly|10 years ago
unknown|10 years ago
[deleted]
kragen|10 years ago
perfTerm|10 years ago
unknown|10 years ago
[deleted]
0xdeadbeefbabe|10 years ago
chm|10 years ago
noja|10 years ago
E1OX8|10 years ago
Pond is a great example of doing this well: https://pond.imperialviolet.org/threat.html
"if an entity can do something that is not listed here then that should count as a break of Pond"
cbd1984|10 years ago
ytdht|10 years ago