27 Mar
2014
27 Mar
'14
12:05 a.m.
On Wed, Mar 26, 2014 at 4:23 AM, John Young <jya@pipeline.com> wrote:
Ubiquitous use of a comsec system is a vulnerability, whether PGP or Tor or another popular means.
"Ubiquitous trust in technology without assurances nor fail-safes is a vulnerability" - fixed that for you JYA plenty of corollaries in architecture, to be sure. ;)