PogoWasRight.org

Menu
  • About
  • Privacy
Menu

How to keep NSA computers from turning your phone conversations into searchable text

Posted on May 9, 2015June 26, 2025 by Dissent

Dan Froomkin writes:

As soon as my article about how NSA computers can now turn phone conversations into searchable text came out on Tuesday, people started asking me: What should I do if I don’t want them doing that to mine?

The solution, as it is to so many other outrageously invasive U.S. government tactics exposed by NSA whistleblower Edward Snowden, is, of course, Congressional legislation.

I kid, I kid.

No, the real solution is end-to-end encryption, preferably of the unbreakable kind.

Read more on The Intercept.

No related posts.

Category: Surveillance

Post navigation

← Debt collectors fight privacy advocates over limits for automated license plate readers
Six U. of Oregon employees, including vice president, under investigation for alleged misconduct concerning rape case →

Search

Contact Me

Email: info[at]pogowasright.org
Security Issue: security[at]pogowasright.org
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]pogowasright.org

Research Report of Note

A report by EPIC.org:

State Attorneys General & Privacy: Enforcement Trends, 2020-2024

Categories

Recent Posts

  • DHS offers “disturbing new excuses” to seize kids’ biometric data, expert says
  • California Adds Injunctive Relief to its Right of Publicity Statute and Extends Liability to Digital Replicas
  • DHS Gives Local Cops a Facial Recognition App To Find Immigrants
  • Phone location data of top EU officials for sale, report finds
  • DHS proposes biometrics expansion for immigrants, dropping age restrictions and requiring biometrics from some US citizens
  • Sling TV settles with California for allegedly violating state consumer privacy law
  • Massive Great Firewall Leak Exposes 500GB of Censorship Data

RSS Recent Posts at DataBreaches.net

  • Pro-Russian hackers target Belgian telecom websites in DDoS attack
  • Nevada Refused to Pay Cyberattack Ransom as Systems Sat Compromised for Months
  • Journalists going solo on Substack at risk from hackers
  • Kr: Investigation shows KT concealed malware infections, security failures leading to hacking breach
  • Hackers defraud multiple lawmakers, a Pakistan Senate committee told
©2025 PogoWasRight.org. All rights reserved.