I disagree. Solutions can involve broadening technical security awareness and education, not only for experts, but for the great masses. Suddenly, people who wouldn't have done it otherwise, are installing PGP, guided by well-designed step-by-step-instructions which haven't existed before Snowden. This is per se a Good Thing.
Awareness leads to more people trying to exploit things previously thought to be at least very improbable to break. Discussions about Crypto-Quines, VM-breakouts, you name it, are suddenly on the rise, at least in my perception (which has since sharpened significantly, and I'm not even in the least involved in security)
Better tools are developed to prevent goto fail;s. Other people fork OpenSSL, sunset SHA1, visit security-related conferences or donate money, you name it. This is a slow process, but things are definitively moving forward.
But again, you're avoiding to answer the question: What a difference would it make if your scenario would be true? Would it negate that mass surveillance exists? Of course not. But that's what's important here, that's what's being worked on by people.
It's one thing to be a classical "we can't win anyway" naysayer, but is's a completely different thing to try to pull an ad hominem derailment, so the question arises: Who are you working for? What if your supervisor came to you telling you "Try to find something about Snowden we can use against him and his findings. A way to discredit him, maybe find someone who went to school with him who can make a fool out of him; maybe try to pull an assange-like sexual assault case on him, anything", what would you do?
I disagree. Solutions can involve broadening technical security awareness and education, not only for experts, but for the great masses. Suddenly, people who wouldn't have done it otherwise, are installing PGP, guided by well-designed step-by-step-instructions which haven't existed before Snowden. This is per se a Good Thing.
Awareness leads to more people trying to exploit things previously thought to be at least very improbable to break. Discussions about Crypto-Quines, VM-breakouts, you name it, are suddenly on the rise, at least in my perception (which has since sharpened significantly, and I'm not even in the least involved in security)
Better tools are developed to prevent goto fail;s. Other people fork OpenSSL, sunset SHA1, visit security-related conferences or donate money, you name it. This is a slow process, but things are definitively moving forward.
But again, you're avoiding to answer the question: What a difference would it make if your scenario would be true? Would it negate that mass surveillance exists? Of course not. But that's what's important here, that's what's being worked on by people.
It's one thing to be a classical "we can't win anyway" naysayer, but is's a completely different thing to try to pull an ad hominem derailment, so the question arises: Who are you working for? What if your supervisor came to you telling you "Try to find something about Snowden we can use against him and his findings. A way to discredit him, maybe find someone who went to school with him who can make a fool out of him; maybe try to pull an assange-like sexual assault case on him, anything", what would you do?
Wouldn't we find you here?