Comment Re:We need easy to use end to end encryption (Score 1) 337
You're mixing two different programs. There is the program to monitor Verizon and other carriers, but this involved a site-wide pen register system. Then there is PRISM, which gives direct access to the servers of Google, Facebook, and several other tech giants.
End-to-end encryption hides information that is not being collected in the former program as they are not wiretapping the phone's voice data. End-to-end encryption does nothing for the latter program as the endpoint (Google, Facebook, etc) are providing your data to regardless how hard you try to obfuscate it from prying eyes.
End-to-end encryption hides information that is not being collected in the former program as they are not wiretapping the phone's voice data. End-to-end encryption does nothing for the latter program as the endpoint (Google, Facebook, etc) are providing your data to regardless how hard you try to obfuscate it from prying eyes.