GPG - The World’s Email Encryption Software Relies on One Guy, Who is Going Broke

Discussion in 'privacy general' started by NGRhodes, Feb 5, 2015.

  1. NGRhodes

    NGRhodes Registered Member

    Joined:
    Jun 23, 2003
    Posts:
    2,331
    Location:
    West Yorkshire, UK
  2. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    6,028
    Dude, you beat me by maybe a minute or two ;)

    I will also be donating, as soon as I free up some Bitcoins.
     
  3. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    3,764
    Location:
    Outer space
    Keep in mind that it not just email encryption software. Signed files can be verified(huge example is update system of Linux distros) and lots of corporations also use it for encrypting files. Survival (and improvement) of GnuPG is paramount.
     
  4. krustytheclown2

    krustytheclown2 Registered Member

    Joined:
    Nov 18, 2014
    Posts:
    210
    I wouldn't be surprised if the NSA tried to take advantage of this by trying to slip him some cash in order to include a well obfuscated hole.... It's disconcerting how something so critical to millions of people's security, is made by a solitary broke computer geek
     
  5. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,149
    Location:
    UK
    Done - I never knew or imagined that was the situation.

    It violates my Tos that the many many commercial organisations that DO use these utilities have not provided funding. It's my opinion that the only circumstance under which they should have any protection or mitigation from liability for negligence in case of hacking, data loss etc. is if they have a support contract for the security code they use, and they have subscribed to an audit report and security advisories for it.

    I think that is the only way that high quality secure open source software will be adequately funded.

    And the chances of our political masters allowing that to happen are zero to negative. They actively want weak encryption and backdoors.
     
  6. Kiebler

    Kiebler Registered Member

    Joined:
    Feb 3, 2015
    Posts:
    15
  7. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    5,057
  8. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    6,028
  9. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    5,057
  10. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,095
    How do we pay for privacy?.

    -- Tom
     
  11. 1PW

    1PW Registered Member

    Joined:
    Apr 2, 2010
    Posts:
    700
    Location:
    North of the 38th parallel.
    Lest the primary purpose of this topic wildly deviates from its original intent,

    the URL for donations to our friend Werner Koch is through https://gnupg.org/donate/index.html.

    Thank you all.
     
  12. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    1,592
    There is a bitcoin address linked there as well.
     
Loading...