Glossary

Effect on mass interception:

Cable-level interception: captures encrypted ciphertext — useless without keys - Legal orders to companies: companies cannot produce what they don't have (no keys) - Limitation: metadata remains accessible; device-level attacks (Pegasus) can bypass

Learn More

Related Terms