[149241] in cryptography@c2.net mail archive
Re: [Cryptography] The crypto behind the blackphone
daemon@ATHENA.MIT.EDU (Phillip Hallam-Baker)
Mon Jan 27 18:06:10 2014
X-Original-To: cryptography@metzdowd.com
In-Reply-To: <4379883F-62D4-43FF-86AB-19BAD67FA0C4@callas.org>
Date: Mon, 27 Jan 2014 17:40:00 -0500
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Jon Callas <jon@callas.org>
Cc: =?ISO-8859-2?Q?Daniel_Cegie=B3ka?= <daniel.cegielka@gmail.com>,
	Ralf Senderek <crypto@senderek.ie>,
	Cryptography <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
--===============3246039868195576319==
Content-Type: multipart/alternative; boundary=089e01493f644c725204f0fb6358
--089e01493f644c725204f0fb6358
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
On Mon, Jan 27, 2014 at 4:01 PM, Jon Callas <jon@callas.org> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On Jan 27, 2014, at 9:24 AM, Daniel Cegie=C5=82ka <daniel.cegielka@gmail.=
com>
> wrote:
>
> >
> > What gives you the use of cryptography, if your phone is factory
> > built-in backdoor (baseband)? Until not solve this problem, you can
> > not say that Blackphone is really safe.
>
> I would *never* say that it is safe.
>
> Okay, okay, after the Drudge Report called us NSA-proof, I was given a
> chocolate bar in the shape of a cell phone, and said that *that* was
> NSA-proof blackness and comes in plain or milk. There was an entertaining
> twitterstorm following, which was lots of fun.
As Robert Morris used to say, the three laws of computer security
1) Don't have a computer
2) If you have a computer, don't turn it on
3) If you turn it on, don't use it
--=20
Website: http://hallambaker.com/
--089e01493f644c725204f0fb6358
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
<div dir=3D"ltr"><br><div class=3D"gmail_extra"><br><br><div class=3D"gmail=
_quote">On Mon, Jan 27, 2014 at 4:01 PM, Jon Callas <span dir=3D"ltr"><<=
a href=3D"mailto:jon@callas.org" target=3D"_blank">jon@callas.org</a>></=
span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div class=3D"im">-----BEGIN PGP SIGNED MESS=
AGE-----<br>
Hash: SHA1<br>
<br>
</div><div class=3D"im">On Jan 27, 2014, at 9:24 AM, Daniel Cegie=C5=82ka &=
lt;<a href=3D"mailto:daniel.cegielka@gmail.com">daniel.cegielka@gmail.com</=
a>> wrote:<br>
<br>
><br>
> What gives you the use of cryptography, if your phone is factory<br>
> built-in backdoor (baseband)? Until not solve this problem, you can<br=
>
> not say that Blackphone is really safe.<br>
<br>
</div>I would *never* say that it is safe.<br>
<br>
Okay, okay, after the Drudge Report called us NSA-proof, I was given a choc=
olate bar in the shape of a cell phone, and said that *that* was NSA-proof =
blackness and comes in plain or milk. There was an entertaining twitterstor=
m following, which was lots of fun.</blockquote>
<div><br></div><div>As Robert Morris used to say, the three laws of compute=
r security</div><div><br></div><div>1) Don't have a computer</div><div>=
2) If you have a computer, don't turn it on</div><div>3) If you turn it=
 on, don't use it=C2=A0</div>
</div><div><br></div>-- <br>Website: <a href=3D"http://hallambaker.com/">ht=
tp://hallambaker.com/</a><br>
</div></div>
--089e01493f644c725204f0fb6358--
--===============3246039868195576319==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============3246039868195576319==--