@geeess
Implementing backdoors for German intelligence agencies

@cpt @geeess There are no backdoors in Tutanota. To prove that the entire client code is open source: tutanota.com/blog/posts/open-s

@Tutanota
Yeah, that's like being at the doctor's being told " Here are your lab results. Go, find out yourself"

@cpt @Tutanota Being open source allows independant security researchers to identify backdoors and flaws quite quickly. Any backdoor would have already made the news. Tutanota also has a Warrant Canary (eff.org/deeplinks/2014/04/warr) and publishes a Transparency Report (tutanota.com/blog/posts/transp). Tutanota was also subject to an extensive penetration test in 2013 (tutanota.com/faq#certification). If there were any backdoors, they would have been uncovered during the test. Keep it up, ! ๐Ÿ‘ ๐Ÿ˜

ยท Web ยท 1 ยท 0 ยท 0

@sudo
I don't give a damn about the code. Tutanota is willing to give German givernments insights into user mails and data. This is a backdoor, even if not implemented ibto the code. And still no comment from Tutanota. I'm done.

@cpt Tutanota did reply to your doubts: social.privacytools.io/@cpt/10. Please check your sources before assuming anything. Could please explain as to why you think Tutanota has backdoors?

Sign in to participate in the conversation
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml