6 easy rules to identify 99% of snakeoil

via Security and the Rise of Snakeoil

  • not free software
  • runs in a browser
  • runs on a smartphone,
  • the user doesn’t generate, or exclusively own the private encryption keys,
  • there is no threat model,
  • uses terminology like “cyber”, “military-grade”, or other marketing mantra,

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.