If you find yourself forced to use a network that is under the control of, designed by and/or operated by a potential adversary, then you're going to need end to end encryption.

- Phil Zimmermann

Reply to this note

Please Login to reply.

Discussion

No replies yet.