@zeynep and it's why the NSA is disingenuous when it says no big deal we only collect call meta data.
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@zeynep@kaythaney Something Schneier and company brought up in their Harvard anti-#GoingDark paper last month: http://bit.ly/1MxkDd0Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Also note intelligence agencies are using "burner-to-burner" closed loops to identify suspects. But won't work if burners discarded fast.
-
It's almost like this: if you have true burner phones easily available—and sophisticated terrorists—encryption is almost irrelevant. Almost.
End of conversation
New conversation -
-
-
@zeynep Did NPR this morning say somebody saw encryption software on terrorist's laptop? How does random guy identify encryption software? -
.
@AnnFinkbeiner That was the puzzling part of the story. Something about seeing gibberish on screen? Makes zero sense. - Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.