Hacker News new | past | comments | ask | show | jobs | submit login

Yes, it's a fairly detailed description of how it's done, but to me this information doesn't seem to broaden the scope or intrusiveness of the surveillance apparatus that has been uncovered so far, the convenient interface for warranted querying that is PRISM.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: