Hacker News new | past | comments | ask | show | jobs | submit login

I disagree, some key points were clarified. To wit -

1. Encryption works, but "endpoint security" is easily defeated.

2. "US Persons do enjoy ... one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time."

An "ingest point" appears to be the term for a preprocessor that parses raw data before sticking a normalized copy in a database. I believe this is talked about more in Boundless Informant papers.

3. American data is regularly collected "incidentally", and when between an American and a foreigner. "Americans' communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant."

4. Intelligence agencies (including GCHQ) have raw access to query NSA databases, and GHCQ is cited to have 5% of queries audited.

I made an effort earlier to try to write up a fully cited description of what we know about NSA activities. If you would find that useful, you can find it at https://news.ycombinator.com/item?id=5892755




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: