Follow

@geeess@mastodon.social
Implementing backdoors for German intelligence agencies

@cpt @geeess There are no backdoors in Tutanota. To prove that the entire client code is open source: tutanota.com/blog/posts/open-s

@Tutanota
Yeah, that's like being at the doctor's being told " Here are your lab results. Go, find out yourself"

@cpt
Maybe some of the teachers were lying to the medicine student at the university. So, the doctor can't really diagnose your disorder.
There is no exit in a world of suspect, you are just playing with mirrors.
@Tutanota

@cpt @Tutanota Being open source allows independant security researchers to identify backdoors and flaws quite quickly. Any backdoor would have already made the news. Tutanota also has a Warrant Canary (eff.org/deeplinks/2014/04/warr) and publishes a Transparency Report (tutanota.com/blog/posts/transp). Tutanota was also subject to an extensive penetration test in 2013 (tutanota.com/faq#certification). If there were any backdoors, they would have been uncovered during the test. Keep it up, #Tutanota! πŸ‘ 😁

@sudo
I don't give a damn about the code. Tutanota is willing to give German givernments insights into user mails and data. This is a backdoor, even if not implemented ibto the code. And still no comment from Tutanota. I'm done.

@cpt Tutanota did reply to your doubts: social.privacytools.io/@cpt/10. Please check your sources before assuming anything. Could please explain as to why you think Tutanota has backdoors?

Sign in to participate in the conversation
Mastodon πŸ” privacytools.io

Fast, secure and up-to-date instance. PrivacyTools provides knowledge and tools to protect your privacy against global mass surveillance.

Website: privacytools.io
Matrix Chat: chat.privacytools.io
Support us on OpenCollective, many contributions are tax deductible!