from the casual interactions it looks like among those not involved there are likely to be two different views, (1) we need to use this code to circumvent the censorship and (2) we already have this problem theoretically modeled well so what’s the point of the leak
At some point with leaks and things like this one expects to discover (3) novel, hitherto unpublicized technologies for surveillance, censorship, and popular control, the uncovering of which informs and changes the public landscape of theoretical study
Dunno if this is (3) but given how _outdated_ most of our classic stuff is now (1) is actually very much worth considering despite the confidence of (2) when coming from “free” nations or situations. I did not see awareness of (2) expressed by (1) which likely would be worrying
of course what usually happens here is that (1) finds loopholes which turn into honeypots and controlled echo chambers (like mine!), like any situation where your surveillance research is itself surveilled by the adversary you’re researching
but roughly i’m guessing that some people likely associated with the controlled nations are taking thism_very seriously_ whereas those from “free” situations are not […