(but now i’m talking for the sake of talking and will try to float back into the hedges and out of this thread)
-
-
Some of what he said is right. But then he claims that CSAM scanning can he moved to the client in an offhand way, says we can do device encryption backdoors (“though with difficulty”), and his view on wiretapping is undefined except that 0days are currently sufficient.
-
Whole thing about how tech companies haven’t thought hard enough about how they can get full device encryption while also getting law enforcement access, which he says we have good options for.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.