Panic or hype on Internet equals more bucks for abusers of network backbone
Encryption is only as strong as its endpoints. e.g. if you’re running a very secure protocol on a system with a compromised OS, you’re owned. If you’re using high-end mobile or fiber on a network with compromised routers or towers, you’re owned.
Corruption Law / Legal Lifestyle Linux People Politics Software Technology Telecom World विश्वगुरु