key quote from article: "they are all using OTR [Off the Record] protocol, which offers end-to-end encryption"
Interesting point - that the security services themselves are turning to hacking to put malware onto ISIS suspects' computers. Hacking for the greater good.
Security Forum
Share security advice on our community forum. Ask questions, post news and best practices.
17
How does IS communicate securely?
Post by: Anastasios Arampatzis
Tweet
Upvoted By:
Thank you for posting a comment.
key quote from article: "they are all using OTR [Off the Record] protocol, which offers end-to-end encryption"
Interesting point - that the security services themselves are turning to hacking to put malware onto ISIS suspects' computers. Hacking for the greater good.
Security Forum