Comments
  1. You must read the article before you can comment on it.
    • jbuchana4 years ago

      A third article on trusting your computer/phone.

      In my comment on the last article I posted, I mentioned Ken thompson's article about having to trust your computing environment right down to the level of the hardware manufacturer itself.

      Then I ran across an article with information about US laws requiring "secret" backdoor access to your information by law-enforcement agencies. Access that was likely abused by the maker of hardware for their own governments's spying efforts. Don't trust any entity if it's really important.

      Fortunately, what most of us do is not that private.