I'll take the opposite stance. A technology with privacy built in by default will leak in places you can't predict. It can provide a false sense of security to non-technical people, and they can become complacent and lax in other steps in the process they're trying to hide.

In my opinion, the simplest solutions with the absolute minimum in information transfer is best.

Reply to this note

Please Login to reply.

Discussion

Fair, it always a good idea to practice proper opsec, and update threat models as necessary.

Nothing is perfect of course but we all accept the best tradeoffs for our threat model.

I once met Bill Wallace during a martial arts seminar, an old heavyweight kickboxing champion famous for his high kicks. Yet in his career, he only had a handful of knockouts from a kick to the head.

He had an amazing intuition for what would or wouldn't work during a fight. Once, the situation came where everything was right. It was the right place and the right time, and he got a knockout kick right from the start.

You might have a favorite tool: a kick or a technology. But to become a champion, you have to use an arsenal of tools, each one for it's correct purpose.

“Privacy technology isn't about your feelings, it's about your math.”

Luke Parker