When I wrote this line on the third page of PERMANENT RECORD, I never imagined the government would underline it with a lawsuit on the very first day of publication:pic.twitter.com/bGgLlNJvhD
-
Show this thread
-
Hours after the United States government filed a lawsuit seeking to punish the publication of my new memoir,
#PermanentRecord, the very book the government does not want you to read just became the #1 best-selling book in the world. It is available wherever fine books are sold.256 replies 1,575 retweets 6,665 likesShow this thread -
Yesterday, the government sued the publisher of
#PermanentRecord for—not kidding—printing it without giving the CIA and NSA a change to erase details of their classified crimes from the manuscript. Today, it is the best-selling book in the world:https://static.macmillan.com/static/holt/permanent-record-edward-snowden/uslinks.html …594 replies 2,989 retweets 10,835 likesShow this thread -
In recent interviews, I've gotten questions over if or how I use a smartphone. They're so dangerous for someone like me, so it's quite difficult to give an in-depth answer. But I published a paper with
@bunniestudios a few years ago discussing some risks:https://www.tjoe.org/pub/direct-radio-introspection …56 replies 1,299 retweets 3,339 likesShow this thread -
Phone security has been something I've struggled with for a long time. I once spoke with
@VICE's@ShaneSmith30 about how it's possible to physically remove internal microphones and cameras from a phone, but even that only mitigates a portion of the threat.https://www.youtube.com/watch?v=ucRWyGKBVzo …32 replies 573 retweets 1,894 likesShow this thread -
But as long as your phone is turned on, even with "location permissions" disabled, the radios in the phone that connect it to all the nice things you like are screaming into the air, reporting your presence to nearby cell towers, which then create records that are kept forever.
71 replies 927 retweets 2,326 likesShow this thread -
Software is equally important. The iOS and Android operating systems that run on nearly every smartphone conceal uncountable numbers of programming flaws, known as security vulnerabilities, that mean common apps like iMessage or web browsers become dangerous: you can be hacked.
33 replies 510 retweets 1,660 likesShow this thread -
If I were configuring a smartphone today, I'd use
@DanielMicay's@GrapheneOS as the base operating system. I'd desolder the microphones and keep the radios (cellular, wifi, and bluetooth) turned off when I didn't need them. I would route traffic through the@torproject network.74 replies 942 retweets 2,887 likesShow this thread -
Replying to @Snowden @DanielMicay and
I think at the point you're removing microphones and speakers, you have to stop calling it a phone
3 replies 1 retweet 13 likes -
I’m not disagreeing with
@Snowden but it’s questionable what is the point of having a device with a radio at all if security is the goal? I remember when wifi was banned on Apple campus.1 reply 0 retweets 0 likes
I think his thread is an unintentional reductio ad absurdum. An ethernet tethered device that only works through Tor is not a smartphone, it's a 1998 laptop
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.