What the hell can be done with this trinity?
Александр
afalex169 at gmail.com
Mon Dec 29 10:13:08 PST 2014
>From the "Spiegel" article
If all else fails, the NSA and its allies resort to brute force:
> 1. They hack their target's computers/
> 2.
>
> They hack Internet routers to get to the secret encryption/
> 3. T
>
> hey intercept computers on the way to their targets, open them and insert
> spy gear before they even reach their destination.
Ok. Nothing new.
But what the hell can be done with this trinity?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1458 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20141229/361f6df1/attachment-0001.txt>
More information about the cypherpunks
mailing list