Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I can only speculate as to what they were thinking when they wrote those specs. Evidently they didn't trust network operators, or they thought that they were avoiding potential attack surfaces.

In addition to the privacy and policy and justice problems with LI, this exploit points to law enforcement agencies as the weak link. There are too many law-enforcement agencies that can initiate intercepts from systems that lack oversight and coordination.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: