@mattblaze How does a copy of the exploit source code indicate the # of times it was used (in potential violation of warrant terms)?
@mattblaze I think it was smart for the FBI to frame the exploit as "key" then, implies single function, no other use beyond unlocking door
-
-
@dguido Yes, that's definitely how they want to frame it; unclear if that will withstand an aggressive defense. -
@mattblaze Sorry for keeping you up late, this was an interesting conversation. Thanks for entertaining my persistent questioning. -
@dguido likewise. I think this will be an interesting case to watch.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.