What the hell can be done with this trinity?

Александр afalex169 at gmail.com
Mon Dec 29 10:13:08 PST 2014


>From the "Spiegel" article

If all else fails, the NSA and its allies resort to brute force:
> 1. They hack their target's computers/
> 2.
> ​​
> They hack Internet routers to get to the secret encryption/
> 3. T
> ​​
> hey intercept computers on the way to their targets, open them and insert
> spy gear before they even reach their destination.


Ok. Nothing new.
​
But what the hell can be done with this trinity?
​​
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1458 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20141229/361f6df1/attachment-0001.txt>


More information about the cypherpunks mailing list