They don't claim 100% uptime. They just happen to have it. We had a 30 second outage on ONE power circuit during hurricane sandy - we noticed because two non-production devices weren't dual power, and of course the notifications from the servers about their dual power being interrupted.
We've been there over 10 years, so we actually kind of know, rather than guessing, how reliable they are.
What exactly do you want us to say? We aren't participating in any dragnets. We've said that plenty of times. If you think that the NSA is in our datacentre, tapping our wires. Well, I was there in July and I moved all the devices by hand. I didn't pull them open and audit the circuit boards - but there's a level beyond which reality is impossible to distinguish from paranoia. We don't follow our hardware from the silicon sands through all the steps before it reaches our datacentre. Of course it could have nasties injected in it.
We design our security processes to make it hard for both hackers AND agencies to attack us with a bunch of things. Not running the same switch with VLANs for both internal and external networks is a big thing - switches are a notorious attack vector. Our internal network devices are fully isolated from the external links.
And then - the security agencies reading your email isn't even the biggest risk to your security and your life for 99.9999% of people. We're not going to throw out tons of features that improve their life for a perception of improved security - so end to end encryption isn't a sane response.
We've been there over 10 years, so we actually kind of know, rather than guessing, how reliable they are.
What exactly do you want us to say? We aren't participating in any dragnets. We've said that plenty of times. If you think that the NSA is in our datacentre, tapping our wires. Well, I was there in July and I moved all the devices by hand. I didn't pull them open and audit the circuit boards - but there's a level beyond which reality is impossible to distinguish from paranoia. We don't follow our hardware from the silicon sands through all the steps before it reaches our datacentre. Of course it could have nasties injected in it.
We design our security processes to make it hard for both hackers AND agencies to attack us with a bunch of things. Not running the same switch with VLANs for both internal and external networks is a big thing - switches are a notorious attack vector. Our internal network devices are fully isolated from the external links.
And then - the security agencies reading your email isn't even the biggest risk to your security and your life for 99.9999% of people. We're not going to throw out tons of features that improve their life for a perception of improved security - so end to end encryption isn't a sane response.