Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

palantir is a US company subject to the cloud act. patient data from 123 hospital trusts is now one mlat request away from us law enforcement regardless of where the servers sit.


Only if Palantir owns the servers and the storage. A lot of what Palantir does is on a clients infrastructure. The entire platform is installed on client infra. At least the one we have where I work is.


> Only if Palantir owns the servers and the storage.

I believe no, MLAT scope is not limited to servers/stored owned by the target entity.

If it was, MLAT would be routinely defeated by targets hosting on AWS, for example.


How would Palantir extract the data if nhs specifies the security infrastructure?


Send Palantir engineers to vault over the data centre wall and extract it on a USB stick like James Bond, presumably.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: