| ▲ | doctorpangloss 3 hours ago | ||||||||||||||||||||||||||||
the government doesn't have superpowerful code crackers though it has a guy working at apple who introduces the subtle vulnerability he is instructed to do | |||||||||||||||||||||||||||||
| ▲ | tptacek 3 hours ago | parent | next [-] | ||||||||||||||||||||||||||||
I expect the evidence for this claim is axiomatic, which is to say that you think it sounds good. | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| ▲ | 8cvor6j844qw_d6 2 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||
Yeah. TAO was intercepting Cisco routers in transit and installing implants. The leap from supply chain interdiction to cooperative insiders isn't a big one. | |||||||||||||||||||||||||||||
| ▲ | thesuitonym 2 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||
Those two are not mutually exclusive. | |||||||||||||||||||||||||||||