list of end-to-end secure protocols, decentralized and end-to-end secure protocols [was: CryptoSeal shutters, ala: LavaBit]

coderman coderman at gmail.com
Mon Oct 21 22:08:08 PDT 2013


On Mon, Oct 21, 2013 at 9:47 PM, coderman <coderman at gmail.com> wrote:
> ...
>> The only solution is to not have the private key itself available to you
>
> interestingly enough, it seems there is so very little analyzing this space.


the Snowden docs have shown that end-to-end is just part of the picture.
 availability is also key to endpoint privacy!

(this is where decentralization and un-descriminate-able come into play...)



More information about the cypherpunks mailing list