hongkongpolt.blogg.se

Cryptocat trillian
Cryptocat trillian









cryptocat trillian

CRYPTOCAT TRILLIAN HOW TO

Moreover, she's been part of security/geek/electronic freedom communities for years, and for more than a decade has been an educator teaching people how to use their computers. She covers Occupy and Anonymous - penning thoughtful, informed, well-sourced pieces that often climb past 3000 words. Norton has never written a story for Wired or any other publication based off a press release. Even if it sounds great, please refrain from showering the tool with unqualified praise.īy all means, feel free to continue hyping the latest social-photo-geo-camera-dating app, but before you tell your readers that a new security tool will lead to the next Arab Spring or prevent the NSA from reading peoples' emails, step back, take a deep breath, and pull the power cord from your computer." He writes: "When a PR person retained by a new hot security startup pitches you, consider approaching an independent security researcher or two for their thoughts. While this post is a response to Soghoian's critique, it's not really directed at him - it's meant for the portion of the security community his blast was emblematic of.įirst, you'd have no indication from Soghoian's critique that Quinn Norton is anything other than an overworked, technically illiterate blogger filling a quota by writing up press releases hyping the next big thing.

cryptocat trillian

It's good journalism, even if a very clubby and very vocal part of the security community blasts it. Cryptocat is a very interesting addition to the suite of security tools available to the world, and is a refreshing breakthrough - thanks to its focus on user experience, something that is abysmally lacking in security tools like Tor and OTR.Ĭelebrating that and explaining the motivation of its creator, while being clear about its technical limitations, isn't hype.











Cryptocat trillian