If you find yourself forced to use a network that is under the control of, designed by and/or operated by a potential adversary, then you're going to need end to end encryption.
- Phil Zimmermann
If you find yourself forced to use a network that is under the control of, designed by and/or operated by a potential adversary, then you're going to need end to end encryption.
- Phil Zimmermann
No replies yet.