Email or username:

Password:

Forgot your password?
Tuta

It's #GlobalEncryptionDay!

Time to remind everyone that a backdoor "for the good guys only" is simply not possible.

By demanding encryption backdoors, politicians are not asking us to choose between security and privacy. They are asking us to choose no security. 👇

tutanota.com/blog/posts/why-a-

42 comments
Chloe

@Tutanota@mastodon.social but u have nothing to hide if u arent a criminyal

Kuwuckl

@Tutanota So true!
Let's continue to fight for both! ✊

Vincent Wanders Aimlessly

@Tutanota nobody can keep a secret anymore. The whole world knows George Costanza ATM pin number.

CynAq 🤘

@Tutanota also the simple question remains: “good guy according to whom?”

Collei :verified:

@CynAq @Tutanota one day you're a good guy, another day when another president is up or when a made up emergency state is declared - you might be the bad guy just as well.

mu

@Tutanota In regards to the crackers and the repressive regimes in your picture, what would happen if Apple encrypted their devices with a key and gave that key to the FBI?

FeralRobots

@mu @Tutanota
Should we really trust FBI's opsec more than Apple's?
(Also that still increases the attack surface since now it's held by 2 orgs.)

tomato.eth

@mu @Tutanota Then it would only be a matter of time before that key is somehow leaked to other parties.

Andreas, DJ3EI, he/him

If the key is on the device, it'd leak in no time.

If this is the public key of an unsymmetric crypto pair, it might take a somewhat longer time for the private key to leak.

@mu @Tutanota

hp

@Tutanota

Call me pedantic but this symbolically states that only Apple and FBI will be able to use that back door.

FeralRobots

@hp @Tutanota
Interesting. Could you unpack why you read it that way? Because the closest I can come to that reading is that they're waiting in line behind the user & the FBI.

hp

@FeralRobots @Tutanota

But look at the size of that door! No way anyone but the first two are going to squeeze through.

FeralRobots

@nske @hp @Tutanota
They do all seem to have unnaturally small arms for their size🤔 ....

DELETED

@Tutanota decided to not create Alt-Texts … I decided therefore to not Boost @Tutanota's Post.

hybridized

@Tutanota Yes, thank you for sharing this! I rely on your email service and greatly appreciate your privacy and security.

Matthew W. Thomas

@Tutanota but they seem too large to fit through the door!

DELETED

@Tutanota Good reminder, and thank you for your hard work on creating tools to reclaim and maintain our privacy!

P.S: Hope I'm not too annoying for asking for this, but, would it be too troublesome to not crop the illustrations next time, so that the artist can be properly recognized?

Tuta

@grinnerface Definitely, thanks for sharing. We did not have the original, will use this one from now on!

ehurtley

@grinnerface @Tutanota It’s being used by a commercial company in commercial advertising - unless they have a license from the artist. As this artist has their name cropped out and isn’t linked or named in the article, this is a copyright violation and should be removed. For a company concerned with privacy and individual rights, you’d think they’d honor an artist’s rights.

Alexandre Morin

@Tutanota “It’s not that I have anything to hide. It’s just that I dont trust your intentions/opsec with my data”

Wander ΘΔ :verified_paw:

@Tutanota you simply can't but controlled selective access into math. It's as simple as that.

Karsten Johansson

@Tutanota I wonder where in that lineup you'll find America's Republicans and Canada's Conservatives.

Andrew Woods

@Tutanota @shawnhooper People believe they are the hero of their own story. So they believe they can solve problems, if only they had access to the data. However, this kind of power is easy to abuse. Instead people need to consider “what if my enemy had this power over me?” Would they still believe it’s a good idea? i think not. This applies equally well to software as well as the law. The best thing we could do to protect everyone is build strong encryption into everything
#security #Software

Dan W

@Tutanota I am pretty sure that Rupe, Zuck and Elon are the “Etc.”

Dan Shick

@Tutanota bad form to crop the artist's name out

Mattias Eriksson 🦀🚵‍♂️

@Tutanota
Why no make everyone hand in a copy of the house keys to the Police, so they can search every house at any time they like for things like drugs and guns. I bet that would be even more effective than getting access to chats.
And since they keys would be held by the good guys, there are not any risks involved, they might even be required to be quiet if they are searching your house when you are asleep.

Pepper The Vixen🏳️‍⚧️🦯

@Tutanota What's the image? The alt text just continues the post

Cybersecurity & cyberwarfare

@PepperTheVixen @Tutanota

> Stuart Carlson's cartoon is not that recent, but unfortunately remains important. It succinctly summarizes what's at stake when backdoors are built into encryption. Then a shadowy gang immediately stands ready to take advantage of it, from the so-called "good guys" (if we are to believe that) to no doubt a range of people with anything but good intentions as well like malicious attackers, repressive regimes etc."

Cybersecurity & cyberwarfare
@PepperTheVixen @Tutanota The Stuart Carlson's cartoon shows (on the left) the back of an iPhone with a small door on which "back door" is written. On the right you can see a little Apple man trying to open the handle of that door. Behind him, a slightly older man, with FBI written on him and dressed like a "man in black" holds his back and shoulder. Behind still a hacker, with the face of a malicious and even bigger, he rubs his hands while he smiles and waits to get hold of the data. Behind him, an even bigger man, dressed in a uniform with the words "repressive regimes", shows an even more evil grin. Behind him, unidentified people drawn with slightly larger dimensions are also laughing.
@PepperTheVixen @Tutanota The Stuart Carlson's cartoon shows (on the left) the back of an iPhone with a small door on which "back door" is written. On the right you can see a little Apple man trying to open the handle of that door. Behind him, a slightly older man, with FBI written on him and dressed like a "man in black" holds his back and shoulder. Behind still a hacker, with the face of a malicious and even bigger, he rubs his hands while he smiles and waits to get hold of the data. Behind him,...
Scott 🏴

@Tutanota This cartoon is clever, but it presumes the FBI isn't also the hackers (for example FBI agents using surveillance tools to check out prospective dates, family, etc.) and the repressive regime

voltar13

@Tutanota
Why "hackers"? Why not "cyber criminals"?
You should've known better...

Go Up