Their point about endpoint compromise? It's true now, it's been true forever. Also true for TOR--what WL uses.https://twitter.com/zeynep/status/840176795072761856 …
-
-
This Tweet is unavailable.
-
Replying to @rbanffy
"good known usb stick" laptop tor etc are not automatic. A brand-new iPod touch—especially for an avg user—may make more sense.
1 reply 0 retweets 0 likes -
This Tweet is unavailable.
-
Replying to @rbanffy
Depends. What if you do nothing else with it? Maybe nothing, right? Why is your computer, USB stick, TOR, etc. safer? Not clear.
1 reply 0 retweets 0 likes -
This Tweet is unavailable.
-
Replying to @rbanffy
Yep, and probably safer than using your own laptop. So there you go. If you are a high-value whistleblower & avg computer person..
1 reply 0 retweets 0 likes -
This Tweet is unavailable.
-
Replying to @rbanffy
Dunno. But there is no 100% foolproof tech solution, almost by definition. But WL was definitely misleading.
1 reply 0 retweets 0 likes -
This Tweet is unavailable.
Guidelines or a discussion of methods was not what WL was doing. Straight up FUD, to discourage whistleblowing.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.