The Biden administration is preparing to take the unusual step of issuing an order that would prevent US companies and citizens from using software made by a major Russian cybersecurity firm because of national security concerns, five US officials familiar with the matter told CNN.
This just feels like a random hit list; how did you come up with it?
Why zoom? It’s based out of San Francisco.
I also object to the Telegram inclusion. Unless you want to include Discord, and various other server side encrypted communication apps. The founders may be Russians by birth but they have Ukrainian roots, are no longer Russian citizens, had their first company stolen from them by the Kremlin, etc. Also I always like to note, Einstein was a German by birth but he was no Nazi.
What’s the FileZilla connection? Tim Kosse (which as far as I can tell it’s still the primary author) is a German.
I mean… That’s fair, I don’t recommend zoom, but those reasons have nothing to do with Russia and everything to do with a company that was willing to lie that they had E2EE and didn’t.
This very partial list is based on my being in cyber security for 20 years and working a variety of incidents involving these apps. You all can do whatever you want with your computers.
This just feels like a random hit list; how did you come up with it?
Why zoom? It’s based out of San Francisco.
I also object to the Telegram inclusion. Unless you want to include Discord, and various other server side encrypted communication apps. The founders may be Russians by birth but they have Ukrainian roots, are no longer Russian citizens, had their first company stolen from them by the Kremlin, etc. Also I always like to note, Einstein was a German by birth but he was no Nazi.
What’s the FileZilla connection? Tim Kosse (which as far as I can tell it’s still the primary author) is a German.
Honestly, Zoom just has a hilariously high frequency of vulnerabilities being discovered.
I mean… That’s fair, I don’t recommend zoom, but those reasons have nothing to do with Russia and everything to do with a company that was willing to lie that they had E2EE and didn’t.
This very partial list is based on my being in cyber security for 20 years and working a variety of incidents involving these apps. You all can do whatever you want with your computers.
That you didn’t give a helpful answer makes me doubt you where as before I was interested in what you had to say.