Another voice www.lawfareblog.com
What's Involved in Vetting a Security Protocol: Why Ray Ozzie's Proposal for Exceptional Access Does Not Pass Muster
Twitter