The great firewall of America. Just instead of blocking like China, it's deep packet capture. They won't block the content, just study every move you do and if you become remotely problematic,...
The great firewall of America. Just instead of blocking like China, it's deep packet capture.
They won't block the content, just study every move you do and if you become remotely problematic, pull up a dossier and assemble a case based on it. Disappear you if convienient.
Short answer: No Here's a sample product. Between things like that, secret warrants on servers or communication networks (or even just not caring about warrants), and virtually infinite budgets,...
Between things like that, secret warrants on servers or communication networks (or even just not caring about warrants), and virtually infinite budgets, mass dragnets are hardly a thing of the past.
That’s not good evidence for the question of what sort of mass government surveillance still happens in the US. The link goes to a product for businesses. It requires that you install a...
That’s not good evidence for the question of what sort of mass government surveillance still happens in the US.
The link goes to a product for businesses. It requires that you install a certificate on the machines running the browsers. The machines are already under the control of the business.
Targeted surveillance of course happens, if law enforcement takes an interest in you. Also, there’s plenty of data that’s public, like on Twitter or Mastodon, or Tildes. And most people have poor opsec.
The great firewall of America. Just instead of blocking like China, it's deep packet capture.
They won't block the content, just study every move you do and if you become remotely problematic, pull up a dossier and assemble a case based on it. Disappear you if convienient.
Hasn't HTTPS made most government interception impossible?
Short answer: No
Here's a sample product.
Between things like that, secret warrants on servers or communication networks (or even just not caring about warrants), and virtually infinite budgets, mass dragnets are hardly a thing of the past.
that involves having a trusted cert on the computers. I guess its possible the NSA owns all root certs, but https is still theoretically secure.
That’s not good evidence for the question of what sort of mass government surveillance still happens in the US.
The link goes to a product for businesses. It requires that you install a certificate on the machines running the browsers. The machines are already under the control of the business.
Targeted surveillance of course happens, if law enforcement takes an interest in you. Also, there’s plenty of data that’s public, like on Twitter or Mastodon, or Tildes. And most people have poor opsec.