As Barbara Streisand discovered,

As Barbara Streisand discovered, adopting a militaristic posture against a tech-savvy mob of civil libertarians is not going to be of much help: Many of them run their own servers and blogs – and have thousands of friends on their social networks – so overzealous attempts to silence them only lead to wider dissemination of … Read more

Republicans didn’t lie to

Republicans didn’t lie to the American people about whether there were classified e-mails on that server and Republicans didn’t tell families of Americans killed in Benghazi that a video was to blame for their murders. There isn’t a vast right-wing conspiracy, Madam Secretary. Just like there wasn’t one back in 1998. Eric Bolling

There are proxies, proxy

There are proxies, proxy servers on the internet, and this is very typical for hackers to use. They create what are called proxy chains where they gain access to a number of different systems around the world, sometimes by hacking these, and they use them as sort of relay boxes. Edward Snowden

A zero-day exploit is

A zero-day exploit is a method of hacking a system. It’s sort of a vulnerability that has an exploit written for it, sort of a key and a lock that go together to a given software package. It could be an internet web server. It could be Microsoft Office. It could be Adobe Reader or … Read more