| | |
Edward Snowden 25 jul.
If Russia hacked the , they should be condemned for it. But during the hack, the FBI presented evidence.
Edward Snowden 25 jul.
Even if the attackers try to obfuscate origin, makes following exfiltrated data easy. I did this personally against Chinese ops.
Edward Snowden 25 jul.
Evidence that could publicly attribute responsibility for the DNC hack certainly exists at , but DNI traditionally objects to sharing.
Edward Snowden
The aversion to sharing evidence is fear of revealing "sources and methods" of intel collection, but is now publicly known.
Blackword 25 jul.
still an individual 25 jul.
If TRUMP is elected, will he pardon you and bring you home? Would you come home after all they put you through?
Edward Snowden 25 jul.
Without a credible threat that USG can and will use capabilities to publicly attribute responsibility, such hacks will become common.
Nicholas Weaver 25 jul.
This is the same reason why I believe the Sony hack attribution to DPRK:
●● Richard Maok 25 jul.
that is the cyber-war
KWiNK 25 jul.
Yeah, not sharing, like, completely defies the very PURPOSE of these programs, to protect US assets and institutions, doesn't it?
USA Election2016 25 jul.
Write a book and explain. Most people don't understand what you talking about
BinHamin 25 jul.
Edward Snowden 25 jul.
This is the only case in which mass surveillance has actually proven effective. Though I oppose in principle, it is a mistake to ignore.
boringfileclerk 25 jul.
Do you believe that you would be granted clemency under a Clinton, or a Trump presidency?
USA Election2016 25 jul.
Please write a book and explain
Jeff Sanders 25 jul.
doesnt take a book. record everything and you can figure out what happened. there, i did it, with room to spare.
Farberg 25 jul.
most people wouldn't read a book.
Jeff Sanders 25 jul.
Hell no. Clinton might offer Pardon but then she would have his head on a platter, duplicutous liar she is.
Edward Snowden 25 jul.
To summarize: the US Intel Community should modernize their position on disclosure. Defensive capabilities should be aggressively public.
Boris Ulianov 25 jul.
the well known “security through obscurity”. I can't believe the NSA uses that deprecated method.