Login
Hide
Panel
Reply: Sat Jul 23 2016 21:40:00 GMT-0400 (EDT)
Reply To: Against the Law: Countering Lawful Abuses of Digital Surveillance
John Schmidt 1 Contributor
July 24, 20161 Version
Not Featured in any Journals
Cite

Bibtex

@article{ReplySatJul22016, title={Reply: Sat Jul 23 2016 21:40:00 GMT-0400 (EDT)}, author={John Schmidt}, year={2016}, note={version: 57a22cbd5a4037b8e01adb3c}, publisher={PubPub}, }

APA

John Schmidt. (2016). Reply: Sat Jul 23 2016 21:40:00 GMT-0400 (EDT). PubPub, [https://www.pubpub.org/pub/57941c70e3faed37004a437e] version: 57a22cbd5a4037b8e01adb3c

MLA

John Schmidt. "Reply: Sat Jul 23 2016 21:40:00 GMT-0400 (EDT)". PubPub, (2016). [https://www.pubpub.org/pub/57941c70e3faed37004a437e] version: 57a22cbd5a4037b8e01adb3c

Chicago

John Schmidt. "Reply: Sat Jul 23 2016 21:40:00 GMT-0400 (EDT)". PubPub, (2016). [https://www.pubpub.org/pub/57941c70e3faed37004a437e] version: 57a22cbd5a4037b8e01adb3c
LoginFollow
0 Followers
I get it. Having a recognizeable case (that says hey, I care about my security/anonymity) might not be very covert. I stand by the effort being put forth here. This is low level reverse engineering, expansion, etc.. all through SIM card, etc... to anyone already putting forward suggestions to the design, you should kinda STFU. Horse before the cart. First lets make this awesome idea come to life, see how it's limited by materialism and then hone it from there.
Contents
Discussions
Contents
Discussions
Show Threads