Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Operators must go to the premises and covertly install the equipment needed to monitor the target. This fact alone limits the scope of surveillance operations. Usually there's a lot more oversight.

Unencrypted communications will be intercepted by default with no warrant, no oversight, no limitations on its processing and on a world-wide scale.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: