They got at Assange on conspiring to help crack a password to gain access. He is alleged to have done more than just encourage and receive.
-
-
The documents seem to indicate that they were using active directory authentication without any form of 2FA, didn’t use a TPM, didn’t lock the bios, and used shared machines.
-
Sounds like deliberate entrapment.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.