| ▲ | notepad0x90 2 days ago | |||||||
Alright, well in the interest of a conclusion, I'll say that you made really good points, I've changed my opinion on some but not all of the topics. > "they want to know who's downloading tails, who's using signal, who the source of some journalist is" They don't care about random people doing those things, but if someone with a known terrorist cell association is in the US talking over signal. Or if someone is visiting extremist sites using tails, they'd want to know (and they can using metadata available today). They're not interested in home-grown terrorism or law enforcement, but all other matters of national security don't neatly fall into "foreign vs domestic" buckets. Even if it is all happening outside of the US, the servers Signal uses might be in the US for example. | ||||||||
| ▲ | monerozcash 2 days ago | parent [-] | |||||||
Yeah, the specific capabilities and operations of intelligence agencies like the NSA are a topic I’ve spent far too much of my life obsessing about. Fortunately, mostly because I’ve been paid to do so, but I should really find better things to do with my free time than rehashing work stuff in HN comments. I think we broadly agree on the details, and whatever differences remain are probably mostly attributable to us looking at the topic from slightly different angles. There's probably not much more we could usefully address on this topic via HN comments, so it is probably a good time to conclude :) If the story behind the shadow brokers leaks is of interest to you, I dumped some details in a reply to a now-flagged thread. It's quite the rabbit hole if you want to dig into it, especially with the whole Hal Martin situation https://news.ycombinator.com/item?id=46186975 | ||||||||
| ||||||||