Next: What is perfect forward secrecy, Previous: Why manual network configuration, Up: FAQ
Any closed source proprietary systems do not give ability to control the computer. You can not securely use cryptography-related stuff without controlling the underlying computing device. Choose another operating system.