Snowden's goals are GoodCrypto's long term goals.
- Software tools
- No association records
- Resistant to traffic analysis
- Padding
- even if there is a performance cost
- counter analysis of packet size, signalling speed, etc.
- Red team
- Peer review model
- "We need people to attack these systems. We need people to work as
adversaries to try to find holes, so we can fix them."
- User experience
- "GPG is robust and pretty reliable encryption. Unfortunately it's damn near unusable."
- Command line
- Key management
- Encryption
- Mixed routing
- "shared infrastructure that divorces the individual connection from the individual origination point"
- Tor
- Non-attributable communications, or Unattributable internet access (UIA)
- Available
- Easy
- Transparent
- Reliable
- Global
- Think about:
- Adversarial targets
- "How are the worst people on Earth going to try to subvert and break your system?"