← Back to context Comment by snowwrestler 11 hours ago I don’t have to accept any assertion in the absence of evidence directly supporting it. 4 comments snowwrestler Reply weberer 11 hours ago https://en.wikipedia.org/wiki/PRISM SpicyLemonZest 11 hours ago I don't think that PRISM involved root access to any devices and this link does not claim that it did. dkdcio 11 hours ago I was expecting this link: https://en.wikipedia.org/wiki/Apple%E2%80%93FBI_encryption_d...still doesn’t really prove much 1 reply →
weberer 11 hours ago https://en.wikipedia.org/wiki/PRISM SpicyLemonZest 11 hours ago I don't think that PRISM involved root access to any devices and this link does not claim that it did. dkdcio 11 hours ago I was expecting this link: https://en.wikipedia.org/wiki/Apple%E2%80%93FBI_encryption_d...still doesn’t really prove much 1 reply →
SpicyLemonZest 11 hours ago I don't think that PRISM involved root access to any devices and this link does not claim that it did. dkdcio 11 hours ago I was expecting this link: https://en.wikipedia.org/wiki/Apple%E2%80%93FBI_encryption_d...still doesn’t really prove much 1 reply →
dkdcio 11 hours ago I was expecting this link: https://en.wikipedia.org/wiki/Apple%E2%80%93FBI_encryption_d...still doesn’t really prove much 1 reply →
https://en.wikipedia.org/wiki/PRISM
I don't think that PRISM involved root access to any devices and this link does not claim that it did.
I was expecting this link: https://en.wikipedia.org/wiki/Apple%E2%80%93FBI_encryption_d...
still doesn’t really prove much
1 reply →