Talk:Bring your own encryption
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||
|
Ad copy?
[edit]Does this smell like a bunch of sockpuppets advertising their stuff or what? We don't take kindly to paid editing around here... 88.112.50.121 (talk) 11:18, 10 April 2015 (UTC)
- I'm sorry, which part sounds like an advertisement to you? Maybe you could point it out to us because we are students trying our best to work on our school project. Or perhaps, you could give us some time since we just started and we are working to improve on it further. Your help (with a little less scorn) will be very much appreciated. Fionachu (talk) 15:34, 10 April 2015 (UTC) — Preceding unsigned comment added by Fionachu (talk • contribs) 15:31, 10 April 2015 (UTC)
This article may not be a direct advertisement, but it does contain a lot of false and even misleading claims made by advertisers. — Preceding unsigned comment added by Bropushim (talk • contribs) 12:41, 14 August 2017 (UTC)
Review on Article
[edit]Structure of article:
The article was well-structure with the proper use of headers and subheaders, which give a brief overview of the main points of the article and allows the readers to understand easily. However, the flow of the contents can be improved. It should start from History, Trends and Issues, Advantages and lastly Challenges
Coverage of article:
Main issues under the sections Advantages and Challenges are discussed in great detail. In addition, there are reasonable links to other Wikipage for the harder terms came across in the article. However, the section under Advantages appears to be too promotional. Also, words like “functionality” could be used for the header instead.
Referencing of article:
Information in the article are obtained from wide diversity of credible sources and appropriate referencing was made. The highly credible sources used include award-winning technology journalist Jaikumar Vijayan and Linda Musthaler, Princpal Analyst of Esential Solutions Corp.
Sohwanru (talk) 08:41, 21 April 2015 (UTC)
Are BYOE and BYOK actually the same thing?
[edit]Our article seems to imply BOYE and BYOK are the same thing but is this correct? It seems to suggest BYOE means the encryption is encryption is handled by the customer. This means that the customer does not need to trust the vendor to implement encryption properly, although they might still need to trust the vendor to only send and store the encrypted data. But it would seem to me BYOK might just mean you provide the keys to the software. This means you don't have to worry the software key generation is flawed, but you still have to trust the software to do the encryption properly, and to not leak your key (along with the other things). Nil Einne (talk) 14:58, 25 February 2024 (UTC)