soatok,
@soatok@furry.engineer avatar

It's exceedingly hard to write good cryptography.

It's even harder to make it usable for its intended use case.

It's even harder to make it fit a wide range of use cases and threat models. (Do you care about metadata resistance? Cwtch is better than Signal for that.)

This is not a space you can just meander into and give it a good college try. You have to be deliberate, meticulous, and highly self-critical to succeed.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • kavyap
  • thenastyranch
  • cubers
  • ethstaker
  • InstantRegret
  • DreamBathrooms
  • ngwrru68w68
  • magazineikmin
  • everett
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • GTA5RPClips
  • JUstTest
  • khanakhh
  • normalnudes
  • osvaldo12
  • cisconetworking
  • provamag3
  • Durango
  • tacticalgear
  • modclub
  • Leos
  • megavids
  • tester
  • anitta
  • lostlight
  • All magazines