6 easy rules to identify 99% of snakeoil

via Security and the Rise of Snakeoil

  • not free software
  • runs in a browser
  • runs on a smartphone,
  • the user doesn’t generate, or exclusively own the private encryption keys,
  • there is no threat model,
  • uses terminology like “cyber”, “military-grade”, or other marketing mantra,


by

Tags: