This is important, folks. This is a more potent method. This also shows exclusive focus on encryption was misguided.https://twitter.com/SteveBellovin/status/711914435355516928 …
-
-
Replying to @zeynep
Also note intelligence agencies are using "burner-to-burner" closed loops to identify suspects. But won't work if burners discarded fast.
1 reply 2 retweets 2 likes
It's almost like this: if you have true burner phones easily available—and sophisticated terrorists—encryption is almost irrelevant. Almost.
8:58 AM - 21 Mar 2016
0 replies
2 retweets
8 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.