Ubiquitous use of a comsec system is a vulnerability, whether
PGP or Tor or another popular means. Crypto advocates and
Tor encourage widespread use as a defense but may be luring
victims into traps. The more users of a system the more likely
it will be attacked by officials or by malefactors.
On Wed, Mar 26, 2014 at 4:23 AM, John Young j...@pipeline.com wrote:
Ubiquitous use of a comsec system is a vulnerability, whether
PGP or Tor or another popular means.
Ubiquitous trust in technology without assurances nor fail-safes is a
vulnerability
- fixed that for you JYA
plenty of
http://www.spiegel.de/international/world/spiegel-interview-with-former-nsa-director-michael-hayden-a-960389-druck.html
In 2008, when President Obama was elected, he had a BlackBerry. We
thought, oh God, get rid of it. He said, No, I am going to keep it. So
we did some stuff to it to make it a