In the aftermath of Edward J. Snowden’s revelations about potential mass surveillance, there has been a sharp increase in the use of these “end to end” encryption apps, which render even the company
In the aftermath of Edward J. Snowden’s revelations about potential mass surveillance, there has been a sharp increase in the use of these “end to end” encry...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Bangladesh under the topic 's'.
About this video
In the aftermath of Edward J. Snowden’s revelations about potential mass surveillance, there has been a sharp increase in the use of these “end to end” encryption apps, which render even the company
that owns the app or phone essentially unable to read or hear the communications between the two “end” users.
This time around, for example, there are widespread claims on social media that these leaked documents show that it was the C. I.A.
Since it doesn’t have a means of easy mass surveillance of such apps, the C. I.A.
The media, to its credit, eventually sorts things out — as it has belatedly started to do with the supposed C. I.A.
An accurate tweet accompanying the cache would have said something like, “If the C. I.A.
that owns the app or phone essentially unable to read or hear the communications between the two “end” users.
This time around, for example, there are widespread claims on social media that these leaked documents show that it was the C. I.A.
Since it doesn’t have a means of easy mass surveillance of such apps, the C. I.A.
The media, to its credit, eventually sorts things out — as it has belatedly started to do with the supposed C. I.A.
An accurate tweet accompanying the cache would have said something like, “If the C. I.A.
Video Information
Views
18
Total views since publication
Duration
1:15
Video length
Published
Mar 11, 2017
Release date