Yep. Compromising the endpoint means encrypted comms are all essentially defeated.
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Look, if the NSA or the CIA is after you personally, with sufficient interest, my money is on them. That's very different.
-
But it's also not true that everything is equally compromised, hopeless. That's Wikileaks playing on journalists' gullibility, as they do..
- Show replies
New conversation -
-
-
I call these "other side" attack scenarios, after Raymond Chen's description of one: https://blogs.msdn.microsoft.com/oldnewthing/20060508-22/?p=31283 …
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I heard you can bypass Signal's encryption by looking over someone's shoulder while they type
-
: That's why I encrypt my screen.
- Show replies
New conversation -
-
-
precisely! nailed it!
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Repeat after me: If your phone is hacked, *nothing* is foolproof. Iphones are hardest to hack. Androids easiest. h/t
@zeynepThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
how many exploits have you written
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I've never heard that, everything I've read says Apple is safer than Windows/Android
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.