Useful column. But still think "bypassing encryption" is the right term (and @zeynep ends up using it here). CIA gets around the encryption.https://twitter.com/zeynep/status/840264430281773057 …
-
-
Replying to @ScottShaneNYT
Thanks. The initial story, unfortunately said "if confirmed" leak would "rock" the tech world when it would cause.. a yawn.
1 reply 0 retweets 0 likes -
Replying to @zeynep @ScottShaneNYT
So a narrow, properly contextualized use of "bypassed" would be accurate except.. hardly news. No need to invoke encryption!
1 reply 0 retweets 0 likes -
Replying to @zeynep
Folks use encryption to ensure privacy. CIA docs show the limits of encryption in protecting comms from your phone.
1 reply 0 retweets 3 likes -
Replying to @ScottShaneNYT
Not news re: CIA docs at all. Device insecurity has been routinely reported in academic and other conferences for.. decades?
3 replies 0 retweets 0 likes -
Replying to @zeynep
Many of our readers don't attend those conferences, sadly
1 reply 0 retweets 3 likes -
Replying to @ScottShaneNYT
Fair; but the reporting should reflect the ground truth. "CIA cache shows they use mostly mediocre, mostly known tools.."
3 replies 0 retweets 0 likes -
I do hope the issues raised are reported more; they are important! I don't mean to sound harsh; I share concerns.
-
-
Replying to @zeynep @ScottShaneNYT
Thank you both for the work that you do!
0 replies 0 retweets 3 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.