I'd say it's still murder, but passive rather than active.
boatswain
Just as an FYI, "averse" is what you want there, rather than "adverse". Likely an autocorrect thing, but figured I'd mention it just in case.
Thanks for posting this; I'd been seeing a lot of people talking about how China was using backdoors that the FBI wanted and used, but hadn't seen anything definitive about US use of those vulnerabilities.
Also this is another reminder for me that I'm glad to be able to vote for Wyden.
I'll be sticking with Protonmail, personally
There are about 8x10^67 ways to shuffle a deck of cards, and about 10^80 atoms in the observable universe, so there are actually far, far more atoms.
There are a lot of parts to the puzzle! It's easy to miss some.
Signal, Whatsapp, etc are great, as long as I don't have access to your phone and password, right? Likewise, what if your phone's operating system has a critical vulnerability that the OS makers don't know about (AKA a zero day) that can allow a complete remote takeover of your device after a single click on a text message? It didn't end well for Jamal Kashoggi: https://www.cnn.com/2019/01/12/middleeast/khashoggi-phone-malware-intl/index.html
E2EE is great for data in transit, and full disk encryption is great for if someone steals your locked device. Neither will help if you have compromised code running on your machine, though.
Once again, Gen X is skipped. Whatever.
It seems to me that Syncthing is the exact right thing to use here; what is "overkill" about it that makes you think you should use something else?
Technically it's O.MG; they work with and are sold through HAK 5, and license Ducky Script.
If we're really lucky, maybe they'll patent the idea and then everyone else will have to stop doing it.