Another voice www.lawfareblog.com

What's Involved in Vetting a Security Protocol: Why Ray Ozzie's Proposal for Exceptional Access Does Not Pass Muster

Also on:

Twitter



My original entry is here: . It posted Wed, 16 May 2018 13:20:27 +0000.

Filed under: personal,