@zeynep Explain?
-
-
@jkohlmann@iyad_elbaghdadi It was full of technical people (TOR developers etc). I begged for verification tools alongside circumvention. -
@zeynep …and of course it comes full circle here: verification requires identity tools, requires security tools, requires encryption tools. - Show replies
New conversation -
-
-
@zeynep Excellent, will go watch that talk and look forward to the written piece. Meanwhile, I wonder if there is any true recourse…Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

