> > from the casual interactions it looks like among those not involved > > there are likely to be two different views, (1) we need to use this > > code to circumvent the censorship and (2) we already have this problem > > theoretically modeled well so what’s the point of the leak > > > > At some point with leaks and things like this one expects to discover > > (3) novel, hitherto unpublicized technologies for surveillance, > > censorship, and popular control, the uncovering of which informs and > > changes the public landscape of theoretical study > > > > Dunno if this is (3) but given how _outdated_ most of our classic > > stuff is now (1) is actually very much worth considering despite the > > confidence of (2) when coming from “free” nations or situations. I did > > not see awareness of (2) expressed by (1) which likely would be > > worrying > > of course what usually happens here is that (1) finds loopholes which > turn into honeypots and controlled echo chambers (like mine!), like > any situation where your surveillance research is itself surveilled by > the adversary you’re researching
but roughly i’m guessing that some people likely associated with the controlled nations are taking thism_very seriously_ whereas those from “free” situations are not […
