> Note: I’m deliberately being blunt in this post because literally more than a decade of softspokenness from cryptography experts has done nothing to talk users off the PGP cliff. Being direct seems more effective than being tactful.
I hate PGP, too. However, I’ve spent money on five YubiKeys and several months of tinkering to make them somewhat work on Linux and WSL. I use them to sign my commits and Debian packages I build.
If your goal is to convince me to throw *all of this* away and sink another shitload of money into an alternative and re-do months of tinkering to make it actually work, then being deliberately blunt and condescending is not going to help your case.
> Note: I’m deliberately being blunt in this post because literally more than a decade of softspokenness from cryptography experts has done nothing to talk users off the PGP cliff. Being direct seems more effective than being tactful.
I hate PGP, too. However, I’ve spent money on five YubiKeys and several months of tinkering to make them somewhat work on Linux and WSL. I use them to sign my commits and Debian packages I build.
If your goal is to convince me to throw *all of this* away and sink another shitload of money into an alternative and re-do months of tinkering to make it actually work, then being deliberately blunt and condescending is not going to help your case.
Isn't this sunk cost fallacy?
[dead]
I don't understand the issue with encrypted emails. Is Proton Mail not secure?
"Is _____ not secure?"
What. is. your. threat. model?
Assuming full security, on Signal someone can also copy and paste my message, just as on Proton Mail they can forward it. I don't see any difference.
From the article:
> Finally, miss me with the “but someone can screenshot Signal” genre of objections.
> As Latacora noted, people accidentally fuck up PGP all the time! It’s very easy to do.
> Conversely, you have to deliberately leak something from Signal.
Ok. I read it without paying attention. Sorry. I got lost in the translation.
[dead]