No, they really don't. We survived for millennia without this power.
With a warrant is different, but valid warrants must be specific. In practice they're not.
-
-
now you’re moving the goal posts. Your earlier position was that use of exploits for a search is an inherent 4a violation.
-
I'm sorry for being imprecise; this is Twitter. My position is that most real-world use of exploits is 4a and 5a violation...
-
...that trying (or even legislating) to keep sw/hw insecure so they can exploit it is harmful to the public at large...
-
...and that developing and keeping 0days to use rather than forcing vendors to fix bugs is harmful to the public at large.
-
Junaid Hussein was hacked by an exploit and then killed. He had already encouraged 2 men to conduct an attack in Garland
-
it is not unreasonable to assume he would have encouraged more attacks that would have harmed members of the public.
-
whether you believe that remote assassination and hacking is ethical in conflict, it is not going away.
-
Better to try to make it go away than be an apologist for it and arm its proponents with arguments.
- 2 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
