Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

4
  • Exactly what do you mean by "complies with the user's data protection"? Commented Nov 12, 2018 at 8:13
  • @Anders I mean, in the worst case, if it is not possible that there is a back door and the information is not in good hands. Commented Nov 12, 2018 at 8:28
  • Are you talking about complying with some specific laws? Or just complying with good security practice in general? Commented Nov 12, 2018 at 8:31
  • @Anders I think that a software without backdoor is a good practice of general security. I'm not saying I have it, but it's hard to trust after discovering this BUG and ensuring that the information was encrypted. How do I know that it fulfills what it says? What would you do in my place? Commented Nov 12, 2018 at 8:37