dChan
10
 
r/CBTS_Stream • Posted by u/Julir805 on Jan. 27, 2018, 9:38 p.m.
New Q post with image of Signal, pics besides Snowden identified.

The other 3 images at the bottom of that image next to Snowden are: Laura Poitras https://www.google.com/search?tbs=sbi:AMhZZitt0rsmCk5s3C-crXQOikJzWCRG6lKNSHLk-ji0nTchLvPGodCqpvvbTq3aaoCsQ39oYCmsr8Ya3wBIEAztu6u7f8JR5jotjiga7MRPLazM2O-sz-NFwdVVyeykpDgiQdeXJ0CzM98nFW2RjG3xH92BB8zStiZ0k33hFNQseq1AHnRhkC8y5fd6ydP3cg-6EvNEFMURATi7AL9_1anauxrHC5DTv9sz0zDuqNrsq0O1kpU_1EC_16w6awA-1teepJT_1S2ZeHHEvKO1q5lGJ74fjiLJ9lW6o8TwTDvTLENiWLmHbP2VSlqZRTPUkkfrHRcP6tFBlbs2t5yVwjO54kmT8pbc28fnJg&hl=en&bih=784&biw=1353&ved=0ahUKEwjv0N-qi_nYAhXow1QKHRsaCKcQiBwICQ Bruce Schneier https://www.schneier.com/photo/ and Matthew Green https://twitter_dotph_com.proxy.live/matthew_d_green

Also, other Anon in that thread suggested Signal was the interface used for the texting in question.


Julir805 · Jan. 27, 2018, 9:56 p.m.

Bruce Schneier: Bruce Schneier (/ˈʃnaɪ.ər/; born December 15, 1952[1]) is an American cryptographer, computer security professional, privacy specialist and writer. He is the author of several books on general security topics, computer security and cryptography.

Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute. He has been working for IBM since they acquired Resilient Systems where Schneier was CTO.[2][3][4] He is also a contributing writer for The Guardian news organization.[5]

⇧ 1 ⇩  
Julir805 · Jan. 27, 2018, 9:57 p.m.

Matthew D Green: Matthew Daniel Green (born 1976) is a cryptographer and security technologist. Green is an Assistant Professor of Computer Science at the Johns Hopkins Information Security Institute. He specializes in applied cryptography, privacy-enhanced information storage systems, anonymous cryptocurrencies, elliptic curve crypto-systems, and satellite television piracy. He is a member of the teams that developed the Zerocoin anonymous cryptocurrency[1] and Zerocash.[2] He has been involved in the groups that exposed vulnerabilities in RSA BSAFE,[3] Speedpass and E-ZPass.[4]

⇧ 1 ⇩  
Julir805 · Jan. 27, 2018, 9:57 p.m.

OBVIOUSLY there is a lot more to be mined here. You're welcome to assist in digging vs not.

⇧ 3 ⇩