Search Mailing List Archives

Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Secure Cloud Computing: Virtualizing the FreedomBox

Nathan of Guardian nathan at
Thu Apr 24 12:25:47 PDT 2014

On 04/24/2014 03:09 PM, Zooko Wilcox-OHearn wrote:
> Therefore if a government, or a murderous mafia, compelled us to
> cooperate with them, we would then say "Well… okay, but… have you
> figured out how your target users acquires the software? Because, you
> know, if they're getting it from Debian, or from Tails, or something,
> then there's not a whole lot we can do to help you backdoor your
> target users…".
This is the same approach we've taken with and OSTN - we
provide a service, but clients like Jitsi, CSipSimple, Linphone, etc
come from other free-software sources. It is counter-intuitive in this
age of a unified vendor for the app and service stack.

Some people say that makes our usability poor, but if you consider "not
being backdoored" as part of usability, then I think we do just fine.

Keep up the excellent work, Zooko.


More information about the liberationtech mailing list