Encryption backdoors must never be allowed. To prove that Tuta is #free from any #backdoor, the entire client code is published as #opensource.
Let’s fight against mass surveillance! ✊
https://tuta.com/blog/why-a-backdoor-is-a-security-risk
#privacy #encryption #surveillance
@[email protected]
Web clients cannot be verified since they can be altered by the server sending the code to the browser. Standard protocols such as IMAP allow using ANY open source client, including those that are already well audited. Not just yours. From my PoV, you are doing it wrong.also, police reserve the right to inspect your butthole any time you talk back to them.
@[email protected] This is precisely why end-to-end encryption must be used for confidential data. We explain the court ruling in detail here:
@[email protected] Hhhhhhhh!
@[email protected] Publishing something as Open Source does not prove that it’s not backdoored, unless users cannot verify that the deployed software matches the published code. You need reproducible builds and independent distribution channels.




