52/ First even when encryption is used by a terror group, possibility of human error looms large. For example, Hame wrote down logon details
-
-
@Snowden Thank you for correcting meThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@rcallimachi 2) That they're using filelockers for comms -- of which monitoring was public -- underlines how little ISIS learns from news. -
@rcallimachi 3) From personal experience, nothing drew my interest more than encrypted traffic from a known target. It "glows on the wire." -
@rcallimachi 4) Remember: even w encrypted comms, metadata reveals *all* on-net activity. That comms happened? Always yes. Content of? no. -
@rcallimachi Appreciate the new details in your reporting. Thanks for sharing. - 1 more reply
New conversation -
-
-
@Snowden@rcallimachi I remember those slides.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.