{"id":186879,"date":"2013-09-09T20:30:00","date_gmt":"2013-09-10T01:30:00","guid":{"rendered":"https:\/\/www.panix.com\/~msaroff\/40years\/2013\/09\/09\/quote-of-the-day-214\/"},"modified":"2013-09-09T20:30:00","modified_gmt":"2013-09-10T01:30:00","slug":"quote-of-the-day-214","status":"publish","type":"post","link":"https:\/\/www.panix.com\/~msaroff\/40years\/2013\/09\/09\/quote-of-the-day-214\/","title":{"rendered":"Quote of the Day"},"content":{"rendered":"<blockquote><p><span style=\"color: blue;\">The upshot is that it is now known that \u201ct<b>he N.S.A. cannot be trusted on the issue of cyber security<\/b>,\u201d said Soghoian. He continued, \u201cMy sincere hope is that the N.S.A. loses its shine. They\u2019re the bad guy; they\u2019re breaking into systems; they\u2019re exploiting vulnerabilities.\u201d It\u2019s conceivable that they have good intentions. And yet, Soghoian continued, \u201cthey act like any other hacker. They steal data. They read private communications.\u201d With that methodology, how easy can it be, though, to give the agency the benefit of the doubt? As many have, Thomas Drake compared the worldview of what he calls the \u201crogue agency\u201d to the total surveillance of George Orwell\u2019s \u201c1984,\u201d in which the only way to escape was \u201cto cower in a corner. I don\u2019t want to live like that. <b>I\u2019ve already lived that and it\u2019s not pleasant<\/b>.\u201d<\/span><\/p>\n<blockquote><p><span style=\"color: blue;\">\u2014<a href=\"http:\/\/www.newyorker.com\/online\/blogs\/elements\/2013\/09\/the-nsa-versus-encryption.html\">Matt Buchanan in <i>The New Yorker<\/i><\/a><\/span><\/p><\/blockquote>\n<\/blockquote>\n<p>(<i>Emphasis mine<\/i>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The upshot is that it is now known that \u201cthe N.S.A. cannot be trusted on the issue of cyber security,\u201d said Soghoian. He continued, \u201cMy sincere hope is that the N.S.A. loses its shine. They\u2019re the bad guy; they\u2019re breaking into systems; they\u2019re exploiting vulnerabilities.\u201d It\u2019s conceivable that they have good intentions. And yet, Soghoian &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1010,971,970,1102,1066],"tags":[],"class_list":["post-186879","post","type-post","status-publish","format-standard","hentry","category-bureaucracy","category-civil-rights","category-corruption","category-intelligence","category-privacy"],"_links":{"self":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/186879"}],"collection":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/comments?post=186879"}],"version-history":[{"count":0,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/186879\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/media?parent=186879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/categories?post=186879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/tags?post=186879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}