Your Phone, Now with More NSA


4-Step Computer Security Upgrade

Learn to encrypt your files, secure your computer when using public Wi-Fi, enable two-factor authentication, and use good passwords.

From the Intercept:

With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted.

Apparently no hyperbole is too hyperbolic when describing the scope of the NSA’s massive data-vacuuming operation.


Get Lawyerist in Your Inbox, Daily

Current Articles
Current Lab Discussions