After the excitement about the new GNU/Linux Sailfish OS phone Jolla and having tinkered around for a couple of days I come to the, – unfortunate, – conclusion, that the phone is not end-user ready (yet).
Although the OS offers an intuitive, fast and clever handling of the functions, many core functions are yet missing.
Watching the community reports and how desperate many are looking for a well working, nicely developed and secure smartphone, I hope that the Jolla team will come up with an update of the missing features soon.
Hi Steve
When using s/mime encryption, which is nicely integrated in the users keychain, with IMAP configured accounts in mail.app, the app does not encrypt the mail and stores it (e.g. as draft) unencrypted on the server before it has been sent.
An attacker can either read the unencrypted mail, if he has access to the server (sysadmin), or in case the IMAP connection is unencrypted, read the unencrypted message on the nodes/routers.
Please fix this.
Take care & best, lx
“The Washington Post” and “der Standard” have reported today, that chinese hackers have tried to break into tibetan activist organisations networks and computers to steal encryption keys. Encryption keys are used to sign and encrypt electronic messages like E-Mails. China operates the world’s largest and most restrictive “Firewall” to censor internet communication and obscure information. Further it is known that in China a certain hacker group called “Titan Rain”, that is most probably financed and supported by the chinese government has been attacking the Pentagon and the german “chancelor house. Many tibetan organisations and activists notice a higher amount on suspect trojans and viruses. But thanks to the operation of Free Software such as the GNU/Linux operation system and Free Sowftware applications, such as GnuPG for encryption and the Tor Project for anonymous internet, the damage has been kept low.
I urge tibetan activists, journalists and news reporters to use encryption technology to secure and assure internet communication. To bypass the chinese firewall (e.g. to access the internet from Lhasa) it is most advisable to use Tor or similar anonymiser software. (see my blog post from the 18th of march 2008).