It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
"I am a huge believer in the rule of law, but I also believe that no one in this country is beyond the law," Comey told reporters at FBI headquarters in Washington. "What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law."
originally posted by: boncho
I know that while they couldn't break some of the previous encryption directly, they simply set up servers that handled the communications so they could get into the messages indirectly. Don't ask me on specifics because I am not technical like that, but for those in the know, maybe you get what I'm saying...
Is this similar? Don't know. But could be.
originally posted by: boncho
I know that while they couldn't break some of the previous encryption directly, they simply set up servers that handled the communications so they could get into the messages indirectly. Don't ask me on specifics because I am not technical like that, but for those in the know, maybe you get what I'm saying...
Is this similar? Don't know. But could be.
"What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law."
originally posted by: tridentblue
originally posted by: boncho
I know that while they couldn't break some of the previous encryption directly, they simply set up servers that handled the communications so they could get into the messages indirectly. Don't ask me on specifics because I am not technical like that, but for those in the know, maybe you get what I'm saying...
Is this similar? Don't know. But could be.
Yeah, you're talking about Stingray:
en.wikipedia.org...
originally posted by: 8675309jenny
Well played FBI, I have nothing to hide anyway, .
originally posted by: tridentblue
a reply to: boncho
If you're talking about man-in-the-middle attacks its the same idea. They place a device to act as a cell tower, and they decrypt the cell communications, record them, and pass them on.