Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

It's widely known and admitted that they have indirect access, by issuing warrants and being provided with slices of the data. You must be talking about some specific form of indirect access?


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: