Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

As the paper points out, ultimately you have to trust the people. This is why vetting processes exist for access to some critical things. And why I have a fairly high degree of confidence that certain reputable people can be relied upon to take a firm stand on principles and ideology (example: if somebody was trying to pressure Moxie Marlinspike to backdoor Signal).


view as:

Legal | privacy