To be perfectly clear, I am NOT saying this is the case, nor am I trying to smear anyone affiliated with this project. I am merely raising this issue for consideration and of course discussion.
TrueCrypt was a respected encryption software organization. Seemingly out of the blue, its anonymous developers announced they were no longer going to maintain their own product. Whether you want to read the public message as a pneumonic device in Latin, to imply the NSA was involved, or you want to argue that a professorâs looming audit ( True Goodbye: âUsing TrueCrypt Is Not Secureâ â Krebs on Security ) scared the developers, either way, this software lifecycle ended prematurely and in a very fishy fashion.
The NSA compromises the very software and hardware that individuals and companies alike come to trust for securing their data against 99.9% of threats. They have many tools at their disposal, as weâve been learning through Snowden leaks. The most recent revelations are that they have tapped into embedded firmware in Harddrives and SIM cards, giving them full backdoor and undetectable access.
Although a sensitive topic, this needs to be asked, put on the table and considered. What if the NSA compromised the SAFE Network before they even went live? (I want to say âbefore we go liveâ, but trying to stay objective here. They might employ hacking, political pressure, public smear campaigns, blackmail, and many other dirty tactics to get their foot in the door.
Imagine millions of users and businesses come to trust the SAFE Network. They find out a year or two after launch that the NSA had unfettered access through an unknown backdoor (via another whistleblower?). How would that affect this systemâs public image, how / when / IF users access the system, how YOU see the SAFE Network, Safecoinâs valuation (implosion), etc.?