(The burner phone use, for example, is more potent since encryption still leaks metadata, which appears more important here. Etc etc.)
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@zeynep@fredbenenson the bit about the laptop is weird. Imagine trying to find the WiFi password & connecting to tor in that situationThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@zeynep If they cannot find any emails, that means there probably weren't any. If they were encrypted, they would be able to find them.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.