Not seeing how. Allowing LE/IC to use 0day (or any) exploits sounds like both unreasonable search & deprivation of property
-
-
Replying to @RichFelker
that is not an opinion shared by judges or lawyers. ¯\_(ツ)_/¯
1 reply 0 retweets 0 likes -
Replying to @thegrugq
Whose lawyers? I bet it's shared by the ACLU's, EFF's, etc. lawyers. :-)
1 reply 0 retweets 0 likes -
Replying to @RichFelker
yup. If you have a warrant it is not a violation of 4a. Not even ACLU believes that searching a computer w/a warrant violates 4a
1 reply 0 retweets 0 likes -
Replying to @thegrugq
With a warrant is different, but valid warrants must be specific. In practice they're not.
1 reply 0 retweets 0 likes -
Replying to @RichFelker
now you’re moving the goal posts. Your earlier position was that use of exploits for a search is an inherent 4a violation.
1 reply 0 retweets 1 like -
Replying to @thegrugq
I'm sorry for being imprecise; this is Twitter. My position is that most real-world use of exploits is 4a and 5a violation...
1 reply 0 retweets 0 likes -
Replying to @RichFelker @thegrugq
...that trying (or even legislating) to keep sw/hw insecure so they can exploit it is harmful to the public at large...
1 reply 0 retweets 0 likes -
Replying to @RichFelker @thegrugq
...and that developing and keeping 0days to use rather than forcing vendors to fix bugs is harmful to the public at large.
1 reply 0 retweets 0 likes -
Replying to @RichFelker
Junaid Hussein was hacked by an exploit and then killed. He had already encouraged 2 men to conduct an attack in Garland
2 replies 0 retweets 0 likes
You're expecting me to be happy about extrajudicial killing that also killed multiple non-targeted civilians in the process?
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.