he message arrived at night and consisted of three words: “Good evening sir!”
The sender was a hacker who had written a series of provocative memos at the National Security Agency. His secret memos had explained — with an earthy use of slang and emojis that was unusual for an operative of the largest eavesdropping organization in the world — how the NSA breaks into the digital accounts of people who manage computer networks, and how it tries to unmask people who use Tor to browse the web anonymously. Outlining some of the NSA’s most sensitive activities, the memos were leaked by Edward Snowden, and I had written about a few of them for The Intercept.
There is no Miss Manners for exchanging pleasantries with a man the government has trained to be the digital equivalent of a Navy SEAL. Though I had initiated the contact, I was wary of how he might respond. The hacker had publicly expressed a visceral dislike for Snowden and had accused The Intercept of jeopardizing lives by publishing classified information. One of his memos outlined the ways the NSA reroutes (or “shapes”) the internet traffic of entire countries, and another memo was titled “I Hunt Sysadmins.” I felt sure he could hack anyone’s computer, including mine.
Good evening sir!
1More
This lawsuit could be the beginning of the end for DRM | Defective by Design - 1 views
1More
What is Blockchain Technology? A Step-by-Step Guide For Beginners - 0 views
1More
Music Downloads Post Their Worst Decline EVER - 0 views
1More
Copyright, Copyleft y Creative Commons, la jungla de los derechos de autor - OvToaster - 0 views
1More
Elements for the reform of copyright and related cultural policies | La Quadrature du Net - 0 views
2More
Teaching kids game design with open source software | Opensource.com - 2 views
2More
Breaking: A2IM Advises Against Licensing Apple Music... - Digital Music NewsDigital Mus... - 0 views
« First
‹ Previous
41 - 60 of 347
Next ›
Last »
Showing 20▼ items per page