Comment My dismay. (Score 1) 88
For the record, even his Linkedin resume is copied from a job template website. I've seen enough now, both from the thread and my own searches.
If I'm encrypting my data with my own keys, how exactly, other than brute force, is the NSA going to get access to the data?
By classifying you as a terrorist and using torture to extract whatever information they need to decrypt the data.
Established technology tends to persist in the face of new technology. -- G. Blaauw, one of the designers of System 360