Useful column. But still think "bypassing encryption" is the right term (and @zeynep ends up using it here). CIA gets around the encryption.https://twitter.com/zeynep/status/840264430281773057 …
-
-
Replying to @ScottShaneNYT
Thanks. The initial story, unfortunately said "if confirmed" leak would "rock" the tech world when it would cause.. a yawn.
1 reply 0 retweets 0 likes -
Replying to @zeynep @ScottShaneNYT
So a narrow, properly contextualized use of "bypassed" would be accurate except.. hardly news. No need to invoke encryption!
1 reply 0 retweets 0 likes -
Replying to @zeynep
Folks use encryption to ensure privacy. CIA docs show the limits of encryption in protecting comms from your phone.
1 reply 0 retweets 3 likes -
Replying to @ScottShaneNYT
Not news re: CIA docs at all. Device insecurity has been routinely reported in academic and other conferences for.. decades?
3 replies 0 retweets 0 likes -
Replying to @zeynep
Many of our readers don't attend those conferences, sadly
1 reply 0 retweets 3 likes -
Replying to @ScottShaneNYT
Fair; but the reporting should reflect the ground truth. "CIA cache shows they use mostly mediocre, mostly known tools.."
3 replies 0 retweets 0 likes -
Replying to @zeynep @ScottShaneNYT
And also report the threat proportionally; iPhones are known to be much more secure to this, for example..
3 replies 0 retweets 1 like
I think many readers got the wrong impression that CIA has some wizardry and easy remote and/or mass surveillance capacity.
-
-
Replying to @zeynep @ScottShaneNYT
Or that Wikileaks had actually revealed something that wasn't known. I wrote op-ed because got bombarded by worried people.
2 replies 1 retweet 2 likes -
This Tweet is unavailable.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.