(Replying to PARENT post)
Can anyone give me examples of which a design flaw in the protocol results directly in poorer security, and how it could have been better designed?
Not that I doubt the claim but I am not literate in this area.
(Replying to PARENT post)
Related to this, you should definitely watch Moxie Marlinspike's (lead dev of Signal) talk where he tells about his discussion with Kipp Hickman, a developer of SSL: https://www.youtube.com/watch?v=UawS3_iuHoA#t=13m52s (until 16:33)
(Replying to PARENT post)
(Replying to PARENT post)
(Disclaimer: this is for the sake of argument. I'm actually a laid-back person and against government surveillance and stuff.)
(Replying to PARENT post)
Is this not simply an economically expedient choice? To put the security and privacy of users below that of product distribution? How is this choice really different than any tradeoff a software company today makes about security?
(Replying to PARENT post)
(Replying to PARENT post)
(Replying to PARENT post)
(Replying to PARENT post)
This is what we mean when we say that the security model of X is obsolete, and an afterthought besides. The threat model was completely different back then: every griefer, troll, thief, and state actor didn't have a pipe straight into your X session through the browser, and for the most part X was used to talk to trusted programs on trusted hosts.
Wayland, by contrast, has a security model for the modern, hostile internet built in from the start.
(Replying to PARENT post)
Fascinating.