From owner-freebsd-advocacy@FreeBSD.ORG Mon Sep 23 18:51:34 2013 Return-Path: Delivered-To: freebsd-advocacy@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 52941516; Mon, 23 Sep 2013 18:51:34 +0000 (UTC) (envelope-from brett@lariat.org) Received: from mail.lariat.net (mail.lariat.net [66.62.230.51]) by mx1.freebsd.org (Postfix) with ESMTP id D9C87218C; Mon, 23 Sep 2013 18:51:33 +0000 (UTC) Received: from Toshi.lariat.org (IDENT:ppp1000.lariat.net@localhost [127.0.0.1]) by mail.lariat.net (8.9.3/8.9.3) with ESMTP id MAA14047; Mon, 23 Sep 2013 12:51:23 -0600 (MDT) Message-Id: <201309231851.MAA14047@mail.lariat.net> X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Mon, 23 Sep 2013 12:51:18 -0600 To: FreeBSD , "freebsd-advocacy@freebsd.org" , freebsd-chat@freebsd.org From: Brett Glass Subject: Re: [FreeBSD-Announce] vBSDcon Registrations Only Open For 30 More Days! In-Reply-To: References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-BeenThere: freebsd-advocacy@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: FreeBSD Evangelism List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 23 Sep 2013 18:51:34 -0000 All: It's good to see corporate support of BSD, but at the same time I have mixed feelings about certain corporations -- Verisign among them -- hosting BSD-related conferences or becoming involved in the development of BSD-based operating systems. Why? Because Verisign, based in Reston, Virginia (the city next door to Vienna, VA, home of the NSA), has strong ties to this shadowy agency. The NSA, in turn -- as reported in documents recently leaked by Edward Snowden -- has a very strong interest in weakening the security of cryptographic algorithms, cryptographic software, and operating systems. We may want to look this gift horse very carefully in the mouth, or at least monitor very closely "contributions" of code that might introduce backdoors or weaknesses. --Brett Glass