View Single Post
Old 02-07-2005, 08:30 PM   #5
hacker
Technology Mercenary
hacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with others
 
hacker's Avatar
 
Posts: 617
Karma: 2561
Join Date: Feb 2003
Location: East Lyme, CT
Device: Direct Neural Implant
I for one, would never trust an application that used encryption without the ability to audit it.

What encryption standards are they using, if any? 3DES? MD4? MD5? AES? SHA-1? None? Something they invented themselves?

How do we know it isn't something lame like:
Code:
XOR + "Handango" * pi
Without the ability to audit it (and a way to retrieve the data from the desktop, in some platform-independent way), there's no trust. Without trust, there's no way my own data is going to get stored in it.
hacker is offline