Most desktop cryptography relies on software created and maintained by corporations, often (not always) based on open standards, but requiring a level of trust in that firm’s ability to resist government efforts to weaken it as well as believing they can validate and audit their own code well enou
via Pocket http://ift.tt/1y2VKEh
No comments:
Post a Comment