Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

"With proper opsec" is doing a lot of work here, and I would presume one very fundamental piece is it is only to be used for non-sensitive conversations. Unless you are going to argue sharing attack plans ahead of the attack on a personal device is okay, which seems absurd on its face in a post-Pegasus world.


Did you read the transcripts?


Yes, i am referring to Hegseth’s texts specifically


The beginning of the transcript is relevant. What do you think is happening there?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: